Published:
Aug 28, 2025
|
Modified:
|
10
min read

Microsoft 365 Security Best Practices and How to Implement Them

Ivan Fioravanti
Ivan Fioravanti, Co-founder and CTO for CoreView, uses his system engineer and .NET development skills to lead CoreView’s technology team. He’s passionate about AI, automation and all things Microsoft 365.

In just the first half of 2025, attackers compromised 15.7 billion records worldwide, nearly double the same period in 2024. Breaches are now more frequent and more expensive (the average cost of a breach is now at $4.88M).

For Microsoft 365 customers, one wrong click – an over-permissioned guest, a forgotten admin role, a disabled conditional access policy – can open your entire tenant. Gartner found that 99% of breaches come down to mistakes like these. And in Microsoft 365, mistakes are almost guaranteed. That’s why every setting, role, and policy you put in place (or leave unchecked) matters. This article covers security best practices to shut down the pathways attackers exploit when mistakes slip through.

This article covers:

Executive summary:

Misconfigurations, privilege sprawl, and limited visibility are the leading causes of breaches and compliance failures. (Gartner) As Microsoft continues to expand its native security capabilities, organizations struggle to determine which controls are essential, how licensing impacts implementation, and where gaps persist. This report organizes existing Microsoft 365 security best practices into clear categories, highlights areas where native tools fall short, and provides a comprehensive checklist for ongoing security and governance. Executives and technical teams can use this guidance to strengthen operational and cyber resilience, reduce risk, and align with compliance frameworks.

Securing identity and access management (IAM) best practices

Verizon’s 2025 DBIR found 82% of breaches involve identity. Yet nearly 60% of enterprises lack basic identity hygiene, like enforcing MFA. These missteps quickly become prime attack vectors.

At enterprise scale, your identities are the single largest risk multiplier. Users and their identities are on the frontlines of security, meaning that everything from basic password hygiene to multi-factor authentication makes a difference to keeping your M365 resources, data, and systems safe. And, unlike smaller tenants, large organizations face unique complexity: multiple business units, thousands of privileged users, and external collaboration at the global scale.

Within Microsoft 365 (M365), Identity and Access Management (IAM) forms the foundation of your organization's security posture. Because of how M365 is structured, everything is integrated with identity. Identity is not just an access layer in M365, but the key to your company’s entire M365 environment.

M365 is a high-value, and often highly accessible, target for attackers because M365 enjoys wide global adoption, almost always offers up a high volume of privileged accounts (and it only takes access to a single identity to wreak havoc – up to and including complete environment takeover) and can unlock access to everything.

This section outlines actionable IAM best practices, step-by-step implementation guidance, and draws on zero trust principles to reduce attack surfaces and prevent unauthorized access. Adopting best practices in IAM not only blocks common threats but also ensures resilience against Advanced Persistent Threats (APT) and insider threats.

Enable multi-factor authentication (MFA) for all users

Enforcing MFA is the single most effective step to protect user accounts. It requires users to authenticate with one or more verification forms in addition to their basic username and password. Users will need to provide a second factor (such as an authenticator app code or push notification) in addition to their password, which helps to block over 99% of automated account takeover attacks.  

MFA should be enabled for all accounts, including administrators and regular users, to drastically reduce the risk of credential compromise and add another layer of protection. Tips for implementing MFA in Microsoft 365 are below.

Enable MFA tenant-wide

Use the Microsoft Entra admin center to either enable Security Defaults or configure conditional access policies to require MFA for all users. Security Defaults are a pre-configured set of security settings that introduce one-click rollout of basic MFA for all users within all M365 plans. This enforces MFA on admin roles and new users by default.

For greater granularity in MFA enforcement, configure conditional access policies, which will require a premium Microsoft 365 license. This allows for more specificity in how MFA is applied under certain conditions, e.g., managing or blocking all logins from outside the corporate network or blocking brute-force-exploitable legacy authentication protocols that bypass modern authentication.

Prioritize admin accounts

Global administrator (and other privileged) roles hold tremendous power – and risk. Privileged accounts have the highest level of access to sensitive information as well as the ability to make system-wide changes. As such, they make tempting attack targets. Immediately require MFA for these roles and secure them first. Roll out MFA to all remaining users as soon as possible (e.g., within 30 days) thereafter.

Require use of authenticator app & phishing-resistant methods

Encourage use of the Microsoft Authenticator app for push notifications, or other phishing-resistant methods like FIDO2 security keys or certificate-based authentication (CBA) rather than SMS codes. App-based or token MFA is more secure and user-friendly (one-tap approval) and avoids SIM-swap or SMS phishing risks. Any authentication app that supports Open Authentication time-based one-time passwords (OATH TOTP) works.

Offer user communication and training

Inform and educate users about the MFA rollout and the importance of MFA. Provide guides on setting up the authenticator app or other second factors. Emphasize that this extra step protects their account and company data.

Understand your M365 licensing policies  

All Microsoft 365 plans support basic MFA (e.g., via Security Defaults). Advanced conditional access policies for MFA enforcement require premium licensing.

Monitor MFA implementation and status

Keep track of user MFA status and monitor overall MFA adoption in your Microsoft Secure Score.

Use secure password policies

Passwords are widely perceived as the weakest link in cybersecurity. More than 8 in 10 hacking-related breaches are caused by weak or stolen passwords. It’s easy to exploit existing password vulnerabilities that range from human error to password fatigue to credential stuffing to phishing attacks. Introducing more secure password policies contributes to enhanced overall M365 security.

Below are secure password policy tips.

Strengthen passwords and password policies

Implement complexity rules for acceptable passwords e.g., length requirements and different characters, including numbers, special characters, and upper/lower case letters.

Introduce a password manager

Password managers can generate long, unique, complex passwords for you and store them securely in their database. Password managers can help prevent phishing attacks as they detect breaches and can provide notifications when a website or password is corrupted.

Adopt passwordless authentication where possible

Password fatigue can cause significant friction for users, which is often where password hygiene and behavior becomes sloppy. Passwordless authentication methods, such as Windows Hello for Business, one-time passwords sent to user device, or secure keys, can help preserve the user experience while adhering to the strongest level of security.

Introduce risk-based conditional access policies

Risk-based access draws on behavioral and contextual signals to grant or deny access to resources based on the assessed risk level of a user or specific sign-in attempt.

Conditional access policies are built around if-then rules that trigger automated response. Triggers rely on signals such as user, device, location, or risk level. Based on the access policies you define, the end user will experience a different outcome. That is, your conditions may block access to certain assets for certain groups of users, may require MFA across the board, or place restrictions on a user’s session.

Conditional access automates your dynamic approach to security based on real-time risk, location, device health, or user role. This ensures that users have just enough access to get what they need to do their jobs, but not enough that it places the organization, its infrastructure and its data at risk.

Risk-based and conditional access implementation tips:

Build your conditional access strategy

Map out your resources and users to determine what needs to be protected and find your vulnerabilities. Having a clear picture of the risk profile of your company’s M365 ecosystem helps you to define, prioritize, and create the conditional access policies that will secure your resilience posture.

There are any number of different risk-based detection events. These can be categorized as sign-in risk and user-based risk. For example, you can block access from high-risk sign-ins using an Entra ID Protection risk score, set compliance conditions for unmanaged devices, implement geo-based controls, block anonymous IP addresses, and enforce app protection for mobile through Intune.

Test and implement conditional access policies  

Introduce your conditional access policies after testing them in report-only mode to see the effects of each policy and make corrections before rolling out live.  

Enforce privileged identity management (PIM)

The 2025 CoreView State of Microsoft 365 Security Report revealed that organizations that deploy PIM solutions experience 64% fewer security incidents while those that fail to manage excessive privilege in the form of admin accounts are 3.8x more likely to experience account compromise incidents.

For these reasons, adopting and enforcing privileged identity management is key to overall security.

Privileged identity management tips:

Limit global admin accounts

Global admin accounts open the door to excessive risk and should be assigned sparingly. Existing admin accounts that do not need admin-level permissions should have appropriate limits in place to ensure just enough access.  

Adopt delegated permissions and role-based access control (RBAC)

Enable granular control over administrative tasks, allowing organizations to assign specific roles and permissions to different users or teams based on roles and functions, limiting exposure and following the least privilege principle.

Implement Just-In-Time and Just-Enough-Access controls

Use workflows to automatically elevate a user’s access to Microsoft roles, like Global Admin or Exchange Admin for a set period of time.

Continuously examine least privilege posture

Access Reviews can help with continuous visibility into your least privilege posture, allowing for regular and automated reviews of privileges.

Don’t forget about – and actively reduce – privileged app access

Human access control is one thing, but don’t forget about apps with read-write access. Application privileges are on the rise, with 51% of organizations in the 2025 Microsoft 365 Security report disclosing more than 250 Entra applications had dangerous read-write permissions. These represent thousands of direct access points into your tenant, which is a massive risk.

Checklist for IAM:

Best practice Implemented?
MFA enabled for all users and monitor MFA status
Prioritize admin accounts
Require use of authenticator app and phishing-resistant methods
Offer user communication and training
Strengthen password policies and introduce passwordless authentication where possible
Introduce risk-based conditional access policies
Enforce privileged identity management (PIM), i.e., limit admin accounts, adopt delegated permissions, RBAC
Control external and guest access
Reduce privileged Entra app access, review regularly
Continuously examine your least privilege posture

Defender for Office 365 - Advanced threat protection (ATP) best practices

Modern attackers exploit multiple vectors — email, links, malicious files, compromised credentials, and device vulnerabilities. In Microsoft 365, Advanced Threat Protection (ATP) tools such as Microsoft Defender provide layered defense. Microsoft’s threat telemetry processes billions of email messages, logins, and endpoint signals daily. While native ATP tools are powerful, misconfiguration or incomplete deployment leaves exploitable gaps.

This section covers ATP best practices with step-by-step implementation guidance, focusing on detection, prevention, and automated response against advanced threats.

Block malicious content

Blocking malicious content in Microsoft 365 is essential to protecting your organization from threats that can compromise sensitive data and disrupt operations. Since M365 is a central hub for email, file sharing, and collaboration, it’s a prime target for cybercriminals. Proactively filtering and blocking harmful content helps prevent attacks before they reach users.

Configure Defender for M365 Safe Attachments

Safe Attachments helps to eliminate email and file threats by blocking or detonating malicious files before they reach users. Defender can ensure that the body of an email is delivered first, and it can replace attachments after scanning them. This can be enabled not just for email but also for SharePoint, OneDrive, and Teams to prevent lateral spread.

Configure Safe Links with URL detonation

Safe Links offers link protection, ensuring that malicious URLs are not weaponized after their initial delivery. Safe Links allows for real-time URL scanning, can be configured to not allow users to click through, and tracks user clicks.

Block high-risk file types and object linking and embedding (OLE) macros

Many ransomware and malware outbreaks start in macro-enabled Office files. To develop defenses against malicious content, implement Attack Surface Reduction (ASR) via Intune to block all Office applications from creating child processes, block macros from the internet, and block high-risk file types like .exe, .scr and .vbs in Exchange transport rules.

Block external email auto-forwarding

Blocking email auto-forwarding to external addresses is central to protecting sensitive company data and the prevention of data breaches. Exchange Admin lets you disable forwarding activity by default and create transport rules to block forwarding to known risky domains as parts of a data exfiltration prevention strategy.

Detect post-compromise activity in real time

Enable zero-hour auto purge (ZAP)

Being able to remove a malicious email even post-delivery (if detected retroactively) is an important aspect of threat removal. ZAP is enabled by default in Defender and helps neutralize spam, phishing, and malware.

Enable Threat Explorer for hunting

Threat Explorer enables proactive hunting for malicious activity to identify actions such as clicked malicious links, blocked attachments, or unusual senders to prepare for faster incident response.

Reduce business disruption

Business disruption comes in many forms, including phishing, ransomware, and business email compromise (BEC) campaigns. Implementing anti-phishing policies, domain and user impersonation protection, spoof protection, email authentication, and device threat detection in addition to continuous monitoring can help reduce the likelihood of significant business disruption.

Configure SPF, DKIM, DMARC

Because email remains one of the biggest security vulnerabilities, employing email authentication adds a layer of needed security. Deploy SPF (sender policy framework) to help prevent email spoofing, DKIM (DomainKeys Identified Mail) that helps validate mail sent by your organization by associating a domain name with the message, and DMARC (Domain-based message authentication, reporting, and conformance) to help prevent email spoofing and phishing by verifying the sender’s identity.

Enable anti-phishing policies

Social engineering schemes like phishing are successful because humans are susceptible to the way phishing works. Implementing anti-phishing policies, such as mailbox intelligence and configuring specific impersonation settings and spoof protections, is key to combating the “human weakest link” and combating these pervasive threats.

Enable domain protection

Domain and user impersonation protection prevents BEC by blocking lookalike domains and user names as part of anti-phishing policies.

Enable Defender for Endpoint EDR

Unsecured devices also pose threats, making Defender critical for detecting and responding to endpoint threats. Onboard devices with Intune and implement tamper protection and automated investigation and remediation.

Enable alert policies for suspicious patterns

Early detection of suspicious patterns allows for faster incident response. Some suspicious patterns might be unusual inbox forwarding rules, sudden inbox rule changes, excessive failed login attempts, or impossible travel logins.

Checklist for ATP:

Best practice Implemented?
Configure Safe Attachments
Enable Safe Links
Block high-risk file types and OLE macros
Block external email auto-forwarding
Enable zero-hour auto purge (ZAP)
Enable Threat Explorer for hunting
Enable anti-phishing policies
Enable domain protection
Configure email authentication
Enable Defender for Endpoint EDR
Enable alert policies for suspicious patterns

Information protection and data governance best practices

While identity holds the key to Microsoft 365’s front door, the data and configurations just beyond that door make up the bulk of your business value and your ability to operate. Protecting and backing up information, data and configurations should be a priority. M365 holds your organization’s most sensitive content. This includes intellectual property, regulated data, executive and strategic communications – and more.

Even if identity credentials are stolen, strong data governance ensures sensitive content is classified, protected, monitored, and, when necessary, automatically disposed of according to policy. And backing up tenant configurations, which is not natively supported in Microsoft 365, is critical to ensuring that your vigilance in protecting your critical data is not for nothing.

Without appropriate governance, you fail to control and oversee your security posture and cannot demonstrate your good-faith efforts to secure cyber resilience.

Define data taxonomy and classify data

An organization requires a shared, consistent set of definitions for levels of sensitivity as a part of building its security posture. Data classification taxonomies and sensitivity labels are a precursor for being able to set up adequate protection for sensitive data.

Define a data classification taxonomy

Work with compliance, legal and business stakeholders to define data classification tiers, e.g., public, internal, confidential, high confidential. Map these tiers to Microsoft Purview sensitivity labels and document the rules in your security governance policy. Make sure to limit the tiers to the most important ones to avoid making the classification too complex.

Deploy Sensitivity Labels with encryption and content marking

Sensitivity Labels are attached to the data as it moves, which will enforce access controls across devices, locations, and applications no matter where the data moves. Sensitivity Labels can be created in Microsoft Purview, and you should also configure encryption to restrict access to specific users or groups and block external access. You can also use content marking to add headers and footers to make status visible, e.g., “Confidential”.

Set default link types for sharing

Having the flexibility to share externally is one of the key benefits of M365, but controlling accidental oversharing is key to preserving your security posture. Require “specific people” be identified when link sharing, rather than permitting “Anyone with the link” option.

Use auto-labeling policies for scale

Once you have set some clear guidelines for sensitivity levels and labeling, you can create auto-labeling policies to remove the manual labor and potential for error that comes with human labeling. Purview allows you to create auto-labeling policies that use built-in sensitive information types and apply them to Exchange, SharePoint, OneDrive, Teams, etc.

Apply file block settings in Office apps

Automatically block certain file types, such as .xlsm or .docm, from being opened from untrusted locations.

Protect data and manage lifecycle

Humans remain responsible for at least 95% of data breaches. Protecting data with a clear data loss prevention (DLP) strategy can lift some of this responsibility off the shoulders of humans by codifying and automating the implementation of policies that help prevent the loss or leakage of sensitive data and manage the life cycle of this data.

  • Enforce Data Loss Prevention (DLP) policies

    In Microsoft Purview, you can set Data Loss Prevention policies from templates to prevent the intentional or accidental leakage of data. You can configure block, warn, encrypt, or audit actions and apply across your Microsoft 365 ecosystem applications, e.g., Exchange, SharePoint, OneDrive, Teams chat, etc.

  • Integrate DLP with data sensitivity labels

    To increase enforcement consistency, you can integrate your DLP policies with data sensitivity labels to create if/then scenarios, such as "If label is 'highly confidential', then block external sharing automatically".

  • Encrypt sensitive content at rest & in transit

    Data requires protection both at rest and in transit and is in fact more vulnerable when in motion. Encryption is important to ensure that even if data is breached, it cannot be used. At rest, data should be encrypted and, in transit, M365 uses TLS by default. Per-item encryption can also be used with sensitivity label encryption.

  • Use Microsoft Purview Information Protection Scanner

    For on-prem repositories, Microsoft Purview Information Protection Scanner finds sensitive data for easier reporting, labeling, or encrypting of found files.

  • Configure insider risk management

    Insiders in an organization can pose as much, if not more, risk as unknown external attackers. With Insider Risk Management in Purview, high-risk activity detection, such as mass downloads or unusual sharing and access, can be identified via specific policies.

  • Block download of sensitive content to unmanaged devices

    Related to conditional access policies already discussed, as well as device management, part of data leakage prevention requires setting policies to block downloads of sensitive content to unmanaged devices.

  • Implement retention labels and policies

    Introducing retention labels and policies ensures compliance with retention requirements and prevents premature deletion. Microsoft Purview allows for creating retention labels that can be applied to content via retention policies, including event-based retention, e.g., employee departure.

Back up tenant configurations and data

It is also important to understand that backing up tenant configurations is as important to your security and business continuity as backing up the rest of your critical data. CoreView’s recent State of M365 Security indicates that most organizations (almost 100%) regularly back up data, but half of all organizations have no idea that Microsoft does not back up their tenant configurations – and only 18% report manually backing up configurations themselves.

This is a massive security gap. After all, if your M365 tenant configurations were compromised (which is a growing problem), how would you restore them if you don’t have them backed up… and don’t even know that you don’t?

  • Choose a vendor for tenant configuration backup

    Microsoft does not have native tenant configuration backup capabilities. You will need to find a third-party solution, such as CoreView, to help you undertake comprehensive tenant configuration backups.

  • Inventory critical M365 tenant configurations

    Get centralized visibility across your M365 applications and inventory all configuration objects across tenants to understand what you need to back up.

  • Establish tenant security baselines

    Identify and define your last “known good” configuration state to which you will restore in the event of an outage or failure.

  • Initiate full tenant configuration backup

    Depending on your solution of choice, the steps here may vary. With CoreView’s tenant-level backup, all supported configuration types are covered, not just workload-level settings. Backups include security and compliance settings, conditional access policies, Teams, SharePoint and Exchange configurations, and users and group privilege settings.

  • Enable continuous drift detection

    Actively monitor hundreds of configuration types for change; automatically identify and alert on configuration drift from baselines in near real-time and restore from backup.

  • Store and version backups

    Keep historical config snapshots for recovery and audit readiness, tagging them with meaningful labels, such as date or event.

  • Test and validate restore procedures

    Simulate restore from configuration backups to ensure recovery can be done. Validate least-privilege security and functional business continuity post-restore.

  • Automate tenant configuration backup and response

    Automate periodic tenant configuration backups. Link backup triggers for security alerts, e.g., if a major policy change occurs unexpectedly.

Monitor, audit and comply

  • Enable records management for regulatory data

    Regulatory compliance, particularly in certain industries, requires that some content be immutable. In Purview, create labels that mark content as a record, which can be locked and is not alterable or available for deletion until expiration.

  • Enable audit log retention beyond defaults

    Default audit log retention is only 180 days for standard M365 licenses. With additional licensing you can extend defaults to create a more comprehensive picture of your security posture. Some industries require longer data retention periods than the M365 default allows.

  • Configure alerts for suspicious file activity

    Automated alerts can help detect potential insider or compromised account behavior. Configure Activity alerts in Purview, which can be triggered on mass download, mass deletion or sharing to a personal email.

Checklist for information protection and governance:

Best practice Implemented?
Define data classification taxonomy
Implement Sensitivity Labels with encryption and monitoring
Deploy auto-labeling policies
Implement DLP policies
Integrate DLP with Sensitivity Labels
Configure retention labels and policies
Encrypt sensitive content at rest & in transit
Use Microsoft Purview Information Protection Scanner
Configure insider risk management
Block download of sensitive content to unmanaged devices
Apply file block settings in Office apps
Set default link types for sharing
Choose a vendor for tenant configuration backup
Inventory critical M365 tenant configurations
Establish tenant security baselines
Initiate full tenant configuration backup
Enable continuous drift detection
Store and version backups
Test and validate restore procedures
Automate tenant configuration backup and response
Enable records management for regulatory data
Enable audit log retention beyond defaults
Configure alerts for suspicious file activity

Device management best practices

Even with strong identity controls and data governance best practices, unsecured devices remain a security risk. Compromised or non-compliant endpoints can be exploited to bypass identity protections and exfiltrate sensitive data.

Hybrid work has increased the use of personal (BYOD) devices, and these endpoints can be compromised as entry points for ransomware and phishing campaigns, which can lead directly to data leakage and lateral movement in cloud services.

Beyond the risk, compliance frameworks like NIST 800-53, CIS Controls, and ISO 27001 require device posture enforcement. Mobile application management (MAM) and Mobile Device Management (MDM) policies help to drive consistency in how data is accessed on mobile devices.

Manage overall device security posture

Only managed devices can be monitored, patched, and controlled. Make sure that your organizations’ devices do not become its biggest weakness.

  • Require device enrollment and management

    Microsoft Intune gives organizations the ability to require device enrollment. For corporate-owned devices, Autopilot can be configured for automated enrollment and provisioning. For BYOD, App Protection Policies can be used if full enrollment is not viable.

  • Enforce device compliance policies

    Device compliance policies define the minimum security posture for any device accessing corporate data. Implement via Endpoint Manager/Intune and require BitLocker/FileVault encryption, minimum OS version, password complexity, and antivirus and firewall.

  • Require OS and security patch compliance

    Reduce exposure to known vulnerabilities by requiring operating system and security patch compliance within a defined timeframe and monitor compliance.

  • Remove unused or stale devices

    Reduce potential attack surface by ensuring that inactive or stale devices no longer have access to data. Remove or disable unused devices within 90 days or fewer and regularly audit devices through Entra ID settings for last sign-in date.

Implement device control

  • Enforce device integrity checks

    Trusted access requires trusted devices. Integrity checks ensure that connected devices have not been tampered with or compromised. Intune Compliance Policies can require Secure Boot enablement, Trusted Platform Module (TPM), and jailbreak/root detection for mobile devices.

  • Use conditional access to enforce compliance

    Zero trust relies on making sure that devices used for accessing M365 resources are actually entitled to do so. Conditional access policies can be set to ensure that non-compliant devices are automatically blocked.

  • Enable full disk encryption

    Aforementioned BitLocker (for Windows) or FileVault (for macOS) encryption prevents offline data theft from lost or stolen devices. BitLocker can be enforced through Intune device config policies, while FileVault encryption can be required in the compliance policy.

Access control and protection

  • Limit admin access to managed devices only

    Create conditional access policy targeting admin roles specifically to ensure that privileged accounts cannot log in from insecure endpoints.

  • Enforce device risk-based access control for dynamic security

    With MDE and conditional access integration, risk-based access control in the form of if/then decisions can be integrated into automated access decisions. For example, if the device risk is medium/high, require MFA or block access.

  • Apply app protection policies for BYOD

    App protection policies for BYO devices helps to secure corporate data on personal devices without requiring full device management. Intune offers options for requiring PIN app access, preventing data transfer to personal apps, and wiping corporate data on sign-out or after inactivity.

External and endpoint security

  • Deploy MS Defender for Endpoint (MDE)

    MS Defender for Endpoint provides advanced threat detection and remediation, allowing organizations to onboard devices via Intune or group policy and enable automated investigation and remediation (AIR) and tamper protection.

  • Configure attack surface reduction (ASR) rules

    MDE also offers attack surface reduction, which can reduce exploit paths by blocking risky actions, e.g., preventing Office from creating child processes, blocking executable content from email or web downloads.

  • Enable mobile threat defense integration for mobile security

    Integrating Intune with MDE enables threat detection from mobile apps, malicious Wi-Fi or OS exploits.

Monitoring and compliance

  • Block unsupported or jailbroken devices

    Because jailbroken devices bypass critical security controls, most organizations will want to block them from accessing sensitive data. Organizations can use compliance policy setting “Mark non-compliance if device is rooted or jailbroken” and can block outdated and unsupported OS versions.

  • Implement device risk scoring and alerts

    Proactive device security monitoring stops incidents before they occur. Use MDE’s built-in device risk score and create alerts in Defender for notifications about device risk score changes and malware outbreaks.

Checklist for device management:

Best practice Implemented?
Require device enrollment and management
Enforce device compliance policies
Require OS and security patch compliance
Remove unused or stale devices
Enforce device integrity checks
Use conditional access to enforce compliance
Enable full disk encryption
Limit admin access to managed devices only
Enforce device risk-based access control for dynamic security
Apply app protection policies for BYOD
Deploy MS Defender for Endpoint (MDE)
Configure attack surface reduction (ASR) rules
Enable mobile threat defense integration for mobile security
Block unsupported or jailbroken devices
Implement device risk scoring and alerts

Application and collaboration hardening best practices

In Microsoft 365, day-to-day work relies on productivity apps and collaboration tools (Teams, SharePoint, OneDrive, Exchange, Office apps). These applications and tools are prime targets for attackers — from consent phishing and malicious add-ins to oversharing of sensitive files.

Hardening these applications reduces the attack surface and ensures collaboration does not compromise security.

Sharing and collaboration governance and security

Attackers exploit collaboration features like file sharing and external access. Add in the commonness of user error with accidental oversharing and trusting malicious apps, and you have a recipe for disaster. Governing how your organization and its people are able to share and collaborate adds a necessary layer of security.

  • Limit and manage external sharing

    Overly permissive sharing settings can lead to sensitive content being shared inadvertently. Set sharing settings appropriate for your organization and disable anonymous sharing for high-sensitivity data or sites.

  • Enforce guest access controls and expiration

    Use access reviews to remove stale guest accounts and remove access when guests’ need ends. Entra Admin enables control over external collaboration settings, including requiring guests to sign in with MFA and enabling automatic guest account expiration within a certain time span.

  • Configure Teams security and governance policies

    Teams often becomes overrun by a proliferation of external users and too much data for comfort. Configure Teams retention policies, disable external chat unless needed, and limit team creation to approved groups.

  • Monitor and alert on suspicious file sharing

    In Microsoft Purview, set up alerts for mass external sharing or sharing to personal email domains to detect potential insider threats or compromised accounts.

  • Apply default link types and expiration dates

    In SharePoint Admin Center, you can reduce persistent external access by setting default link types and expiration periods.

Attack surface reduction and threat detection

  • Block tenant creation and unapproved app registrations

    Disable the ability for users to create tenants, register applications or create security groups to prevent shadow IT and rogue tenants.

  • Enable Safe Links and Safe Attachments across M365 ecosystem

    Safe Links and Safe Attachments extend email-level protections to your collaboration platforms. Both functions are accessible in M365 Security threat policies.

  • Disable OLE package and risky embedding features

    Configure “Do not allow Object Linking and Embedding” in Office settings to block embedded executable content.

  • Limit creation of public Teams/SharePoint sites

    In SharePoint Admin Center, you can prevent accidental exposure of sensitive files by restricting site creation to approved admins, and in Teams, limiting public team creation permissions.

Content and data protection and defense

Not only is content and data central to your organization’s ability to operate, but compliance requirements also often demand that you have complete control over where and how sensitive data is access and stored.

  • Block legacy Office add-ins and unsigned macros

    Malicious add-ons and macros are a frequent initial infection vector. Using Office Policy Service, you can disable unsigned macros and block legacy COM add-ins, and with Group Policy, you can enable the option “block macros from the internet”.

  • Apply Sensitivity Labels to shared files

    Applying sensitivity labels to files maintains classification and protection after sharing and restricts the ability to download or print for highly confidential files.

  • Block downloads of sensitive files to unmanaged devices

    Using conditional access controls, you can set up session control to prevent uncontrolled storage of sensitive data on unmanaged devices.

  • Enable file type blocking in SharePoint and OneDrive

    In SharePoint, you can set up file type blocking to stop the upload or storage of risky file types.

Application security

Weak application security undermines otherwise strong identity and device controls.

  • Require admin approval for app consent

    Implementing admin approval for app consent protects against OAuth consent phishing, requiring users to request admin consent.

  • Use client app policies for mobile access

    In Microsoft Intune, app protection policies control how corporate data is accessed on mobile devices, which prevents copy/paste between corporate and personal apps, requires encryption for app data storage and requires a PIN or biometrics for access.

  • Harden Office apps via policy

    Hardening Office apps reduces the exploitability of the Microsoft Office suite. You can disable automatic activation of ActiveX controls and block linked data types from untrusted sources via Group Policy or Office Cloud Policy.

Checklist for application and collaboration hardening:

Best practice Implemented?
Limit and manage external sharing
Enforce guest access controls and expiration
Configure Teams security and governance policies
Monitor and alert on suspicious file sharing
Apply default link types and expiration dates
Block tenant creation and unapproved app registrations
Enable Safe Links and Safe Attachments across M365 ecosystem
Disable OLE package and risky embedding features
Limit creation of public Teams/SharePoint sites
Block legacy Office add-ins and unsigned macros
Apply Sensitivity Labels to shared files
Block downloads of sensitive files to unmanaged devices
Enable file type blocking in SharePoint and OneDrive
Require admin approval for app consent
Use client app policies for mobile access
Harden Office apps via policy

Monitoring and response best practices

In Microsoft 365, real-time monitoring and rapid incident response are essential to detect, contain, and recover from threats before they escalate into major breaches. Even with best-practice security configurations, visibility and quick action make the difference in the speed with which you can mitigate issues.

Microsoft 365 provides native logging, alerting, and analytics tools, including Unified Audit Logs (UAL), Microsoft Defender for Office 365, Microsoft Sentinel, and Microsoft Purview monitoring capabilities.

Enable logs

  • Retain unified audit logs (UAL)

    The UAL is a critical post-incident investigative tool. Implement via Microsoft Purview.

  • Extend audit log retention beyond defaults

    Extend the default retention (180 days for most M365 licenses) to ensure that retention is long enough for your forensic and compliance needs. Either configure your retention policy to 365 days in Purview (which requires additional licensing), or export logs to Sentinel or an external SIEM for long-term storage.

Detect and alert

  • Configure Admin activity alerts

    Unauthorized admin role changes often precede a major breach. Detecting this early through admin activity alerts configured in Purview can help prevent this.

  • Enable user activity alerts for high-risk actions

    Some user actions, like mass downloads, may indicate a compromise. Configure alerts for events like mass deletions or downloads, mailbox forwarding rule creation, or access to sensitive files outside of typical hours.

  • Monitor suspicious sign-in activity

    Brute force, credential stuffing, and impossible travel events are red flags you can monitor and receive alerts for as suspicious activity. In Entra, you can configure to see risky sign-ins and set up automated policy-based remediations. You can also create Sentinel alert rules for sign-ins from high-risk geographies.

  • Detect and alert on suspicious email activity

    Business email compromise (BEC) and internal phishing are common. Microsoft Defender can alert you to unusual inbox rule creation, sudden spikes in sent messages, and mail forwarding to external domains.

  • Monitor file activity and data movement

    Large data transfers can indicate insider threats or compromised accounts. In Purview it is possible to use the Activity explorer to filter by large downloads and uploads. And in DLP policies, you can enable incident reports for policy matches.

Proactive detection and response

  • Configure Automated Incident Response (AIR)

    Implementing AIR in Microsoft Defender can reduce response time to malware and phishing incidents from hours to minutes. You can also configure auto-remediation levels.

  • Integrate with Microsoft Sentinel

    Integration with Sentinel brings together M365, endpoint, and third-party logs for correlation. Here you can create analytic rules for events such as impossible travel, privilege escalation, or multiple failed logins followed by a successful login to get a more complete security picture.

  • Enable Defender for Cloud Apps (MCAS) alerts

    Defender for Cloud Apps enables the discovery of unsanctioned apps, which detects shadow IT use and risky OAuth apps.

  • Implement real-time risk detection with Entra ID protection

    Real-time risk detection can find compromised accounts before major damage is done. Entra ID Protection implementation enables a user risk policy (requiring password reset or blocking the sign-in) or sign-in risk policy (requiring MFA for risky sign-ins).

  • Conduct regular threat hunts

    Microsoft 365 Defender Advanced Hunting lets you hunt for newly created forwarding rules, access from TOR exit nodes, large file downloads outside work hours, and other queries that evade automated detection.

  • Create and test incident response playbooks

    Being prepared is the best best practice of all, and well-tested incident response playbooks can give you the tools you need to swiftly contain incidents and jump straight into action. A good playbook contains clear roles and responsibilities, escalation paths, and containment procedures.

Checklist for monitoring and response:

Best practice Implemented?
Enable and retain unified audit logs (UAL)
Extend audit log retention beyond defaults
Configure Admin activity alerts
Enable user activity alerts for high-risk actions
Monitor suspicious sign-in activity
Detect and alert on suspicious email activity
Monitor file activity and data movement
Configure Automated Incident Response (AIR)
Integrate with Microsoft Sentinel
Enable Defender for Cloud Apps (MCAS) alerts
Implement real-time risk detection with Entra ID protection
Conduct regular threat hunts
Create and test incident response playbooks

System security management and operations best practices

Strong security in Microsoft 365 is not a “set-and-forget” initiative. It requires ongoing operational discipline, continuous improvement, and measurable governance.

System security management is complex – security baselines drift over time without active management. Microsoft regularly updates capabilities (meaning that best practices evolve). Attackers exploit unpatched systems, misconfigured policies and unused features.

Active security management and M365 security best practices demand that you be vigilant to keep your M365 environment resilient against evolving threats through regular assessments, proactive maintenance, and policy enforcement.

Benchmarking, compliance and governance best practices

Regularly review Microsoft Secure Score

Microsoft Secure Score tracking provides a quantified view of your M365 security posture, benchmarking it against others in the same industry. It also provides recommended actions to improve your score. Implementation is just the first step – you will want to review your score monthly and track score changes over time to measure progress.

Map controls to security frameworks (NIST, CIS, ISO)

Aligning your M365 security with industry-standard frameworks and regulations can ensure best practices as well as compliance. Create a control mapping document linking Secure Score recommendations, conditional access policies, DLP, encryption, and identity protections to NIST CSF, CIS v8, and ISO 27001 guidelines.

Conduct periodic phishing simulations

Simulate phishing actions within your organization to keep user behavior top of mind and drive security awareness organization-wide. Vary the scenarios to make them less predictable, including credential harvesting, malware attachment, and drive-by URL attacks. Provide targeted remediation for those who clicked on problematic simulations.

Automate security reporting for executives

Keep organization leadership informed and accountable by providing monthly executive security reports, which Microsoft tools can provide.

Schedule security audits and access reviews

Manually trying to detect all the issues that exist in your M365 ecosystem would be impossible, so you can schedule automated reviews and audits to detect dormant accounts, excessive privileges and configuration drift.

Run Zero Trust gap analyses regularly

Using Microsoft’s Zero Trust Assessment Tool, you can make sure M365 aligns with the Zero Trust model’s Verify explicitly, Least privilege, Assume breach pillars.

Configuration best practices, vulnerability management, and operational discipline

Maintain and enforce security baselines

By implementing and enforcing security baselines, you can prevent misconfigurations and drift from secure defaults.

Implement change control and documentation

Uncontrolled and unmonitored changes create vulnerabilities. Require change tickets for conditional access modifications, role assignments, and DLP or label policy changes. An M365 Change Log can keep track of these changes for audit purposes.

Perform regular patch management

Ensure that outdated software isn’t opening the door to an M365 attack. Use Windows Update for Business with Intune to deploy updates automatically and enforce deadlines for installation.

Test and validate backups for M365 data and tenant configurations

In the event of needing to recover all of your data or configurations, you need to make sure you have validated full backups for both data and tenant configurations to restore properly. Test restoration procedures regularly for an extra layer of safety.

Checklist for system security and operations:

Best practice Implemented?
Regularly review Microsoft Secure Score
Map controls to security frameworks (NIST, CIS, ISO)
Conduct periodic phishing simulations
Automate security reporting for executives
Schedule security audits and access reviews
Run Zero Trust gap analyses regularly
Maintain and enforce security baselines
Implement change control and documentation
Perform regular patch management
Test and validate backups for M365 data and tenant configurations

M365 security best practice checklist

This master checklist consolidates all security domains — from identity to monitoring — into a single, comprehensive governance tool. A checklist is a living document for evaluating your control over Microsoft 365 security, and as such, should be actively consulted and used to maintain best practices.

How licenses affect M365 security best practices

Many built-in Microsoft features are only available with specific license types. It is important you look into your license type to determine what you can implement directly from Microsoft and what you will either need to upgrade to access or find a third-party solution to cover.

Outdated Microsoft 365 security practices

Microsoft 365 security capabilities evolve rapidly. What was a best practice five years ago – or even a year ago – may now be obsolete or even a security risk if still in use. Update or avoid the following practices as part of your review and adoption of current M365 security best practices.

Basic authentication is not enough

Just blocking basic authentication only for high-risk accounts or certain protocols is outdated advice. Basic Auth is deprecated and will be removed permanently across Microsoft 365. Leaving it enabled leaves wide open a huge attack surface.

Modern best practice is to block all basic authentication across the organization via conditional access. The only exceptions should be for specific service accounts, which should also be migrated to modern auth as soon as possible.

From Microsoft’s documentation, Security defaults in Microsoft Entra ID.

Relying on security defaults alone

Security is an ongoing effort and turning on “Security Defaults” is just step one of a more advanced security approach. Security Defaults do not provide granular access control that enterprises need.

Modern best practice is to use custom conditional access policies tailored to your risk profile, maintaining a policy library for different user groups, e.g., executives, privileged roles, etc.

Modern best practice recommends using Microsoft Defender and its anti-phishing policies with impersonation detection, mailbox intelligence, and domain similarity detection.

Leaving devices and device policies to chance

Leaving minimal device policies in place, only requiring device passcodes or PINs as a security control, is not secure enough, as this ignores encryption, OS compliance and device health.

Adopt Intune compliance policies that require encryption and patch compliance and enforce with conditional access.

Relying on manual security reporting

Surprisingly, many organizations still rely on exporting reports manually from M365 for audit purposes. This is labor-intensive, potentially incomplete, and prone to human error.

Automate reporting to provide continuous clarity and visibility.

Relying only on M365 security and compliance portals for alerts

Microsoft 365 security and compliance portals provide insight into incidents but can be augmented with third-party tools to help centralize incident response, improve visibility and achieve compliance.

Integrating M365 logs with Microsoft Sentinel or another SIEM for unified monitoring will bring alerts up to modern security standards.

Building an effective M365 security strategy with CoreView

A secure Microsoft 365 environment requires more than point-in-time configuration — it demands continuous monitoring, automation, policy enforcement, and operational efficiency.

While Microsoft’s native security stack is powerful, it’s not designed to solve every visibility, automation, and multi-tenant management challenge.

This is where CoreView can fill the gaps — centralizing visibility, automating security tasks, managing multiple tenants, and enforcing governance at scale.

Centralized security visibility

Instead of pivoting between Microsoft 365 Defender, Entra ID, Purview, and Compliance Center, CoreView consolidates critical signals into a single-pane dashboard for faster threat detection and easier reporting. For example, a single view of MFA adoption, privileged role assignments, guest user activity and license usage are possible.

Multi-tenant security management

CoreView provides cross-tenant visibility and control — something Microsoft does not offer natively. Multi-tenant environments are notoriously complex, and almost impossible to manage with native Microsoft tooling. CoreView enables the application of consistent policies, threat monitoring and reporting across tenant environments, relieving organizations of the classic security versus productivity tradeoff.

Granular delegated administration

CoreView’s Virtual Tenants allow the delegation of security administration based on business unit, geography, or function without granting excessive privilege – just the right amount of access for what a specific user or group needs. This granularity reduces risk by enforcing true least privilege access.

Automated security operations

CoreView automates repetitive tasks that otherwise require manual PowerShell scripting or E5 automation licenses, including privilege change alerts and remediation, inactive user cleanup, license compliance monitoring, guest user lifecycle management, and more. Automation reduces operational overhead and human error.

Security governance at scale

CoreView’s governance engine helps organizations enforce security policies continuously, not just during audits. This keeps security on track all the time, preventing baseline drifts and ensuring Zero Trust alignment.

Accelerated incident response

By integrating with Microsoft’s security signals and providing real-time alerting with contextual insights, CoreView helps contain threats faster.

Executive-level reporting

CoreView makes it easy to turn security posture into actionable intelligence for automated reporting.

Augment Microsoft 365 security with CoreView

By pairing Microsoft’s native defenses with CoreView’s cyber resilience and tenant security solutions, organizations can:

  • Shorten detection-to-response cycles
  • Maintain consistent security baselines and easily detect and repair drift
  • Reduce operational burden on IT and security teams
  • Ensure security and governance without sacrificing productivity
  • Prove compliance continuously, not just at audit time

Think of Microsoft 365 as your security engine, and CoreView as the control plane that lets organizations keep that engine running at optimally, filling in the gaps and shortcomings of native Microsoft 365 tooling.

Get a personalized demo today

Created by M365 experts, for M365 experts.