Microsoft 365 Security: 10 Settings Most Businesses Get Wrong
Microsoft 365 is the backbone of most businesses — email, file storage, collaboration, identity. Yet most organizations run it with default security settings that leave significant gaps. Here are the 10 settings we fix on virtually every new client engagement.
1. MFA Is Not Enabled for All Users
Astonishingly, many organizations still don’t have MFA enabled for every account. Microsoft reports that MFA blocks 99.9% of account compromise attacks. Enable Security Defaults at minimum; implement Conditional Access policies for more granular control.
2. Legacy Authentication Is Still Allowed
Legacy authentication protocols (POP3, IMAP, older ActiveSync) don’t support MFA, making them a backdoor for attackers. Block legacy authentication via Conditional Access. Check sign-in logs first to identify anyone still using legacy clients.
3. External Email Forwarding Is Unrestricted
By default, users can set up auto-forwarding rules that send copies of all their email to external addresses — a common attacker technique for persistent data exfiltration. Block external auto-forwarding via Exchange Online mail flow rules.
4. Global Admin Accounts Are Overused
Multiple people with Global Admin access creates unnecessary risk. Best practice: two dedicated break-glass Global Admin accounts with phishing-resistant MFA, and role-based admin accounts for everyone else. No one should use a Global Admin account for daily work.
5. Audit Logging Isn’t Configured Properly
Unified Audit Log is on by default in most tenants, but the retention period is only 180 days on standard plans. For security investigations and compliance, extend retention to at least one year. Enable Mailbox Audit Logging for detailed email activity tracking.
6. External Sharing in SharePoint/OneDrive Is Wide Open
Default settings often allow anyone to create anonymous sharing links. Restrict external sharing to authenticated guests at minimum. Implement link expiration policies and disable anonymous links.
7. Data Loss Prevention Policies Don’t Exist
DLP policies can detect and block sensitive data (credit card numbers, SSNs, medical records) from being shared externally. Most organizations have no DLP policies configured despite having Microsoft 365 E3+ licenses that include this capability.
8. Mobile Device Management Is Not Enforced
Employees access company email on personal phones without any device management. At minimum, configure Basic Mobility and Security or Intune to require device enrollment, enforce encryption, and enable remote wipe for lost devices.
9. Safe Attachments and Safe Links Are Disabled
Microsoft Defender for Office 365 includes Safe Attachments (sandboxing) and Safe Links (URL rewriting at click time). These are often not configured even when the license includes them. Enable both with policies applied to all users.
10. No Alerts for Suspicious Activity
Microsoft 365 can alert you to impossible travel sign-ins, mass file downloads, new inbox rules, and privilege escalation — but only if you configure alert policies. Set up alerts for critical security events and route them to your security team.
Fix These Today
CLIMB IT Solutions provides Microsoft 365 security assessments that identify and remediate these gaps. Book a free M365 security review and we’ll audit your tenant configuration against security best practices.
