Microsoft 365 Security Basics: 10 Settings to Check

Microsoft 365 is powerful—and because it’s so common, it’s also a top target. The good news: a handful of settings can dramatically reduce account takeovers, email impersonation, and data exposure.

Here are 10 high-impact Microsoft 365 security settings to review.

1) Turn on MFA for every user (no exceptions)

Require multi-factor authentication for all accounts, especially admins. If you only do one thing, do this.

2) Protect admin accounts with stronger controls

Use separate admin accounts (not daily-use inboxes) and enforce the strictest sign-in rules for them.

3) Disable legacy authentication

Older sign-in methods (like basic auth) are frequently abused. Block legacy authentication to reduce password-spray risk.

4) Review Conditional Access policies

If you have Entra ID (Azure AD) Conditional Access, use it to:

  • Block sign-ins from risky locations
  • Require MFA outside trusted networks
  • Require compliant devices for sensitive apps

5) Enable security defaults (if you don’t have Conditional Access)

For smaller environments, Microsoft’s Security Defaults can provide a solid baseline quickly.

6) Set up SPF, DKIM, and DMARC for your domain

These help prevent spoofing and improve deliverability.

  • SPF: who can send as your domain
  • DKIM: proves messages weren’t altered
  • DMARC: tells receivers what to do when checks fail

7) Tighten external email and anti-phishing policies

In Microsoft Defender for Office 365 (or Exchange Online Protection), review:

  • Anti-phishing policies (impersonation protection)
  • Anti-spam policies
  • Safe Links/Safe Attachments (if licensed)

8) Block auto-forwarding to external addresses

Attackers love setting mailbox rules that auto-forward email out of your tenant. Disable external auto-forwarding unless there’s a documented business need.

9) Audit mailbox rules and suspicious sign-ins

Check for:

  • New inbox rules you didn’t create
  • “Delete,” “Archive,” or “Mark as read” rules on finance/executive mailboxes
  • Sign-ins from unusual locations/devices

10) Set retention and recovery basics

Make sure you can recover from mistakes or malicious deletes.

  • Confirm deleted item retention settings
  • Use retention policies where appropriate
  • Know how to restore a user and mailbox quickly

Quick checklist (copy/paste)

  • MFA enabled for all users and admins
  • Separate admin accounts in place
  • Legacy authentication blocked
  • Conditional Access or Security Defaults enabled
  • SPF/DKIM/DMARC configured
  • Anti-phishing and anti-spam policies reviewed
  • External auto-forwarding blocked
  • Mailbox rules audited
  • Sign-in logs reviewed
  • Retention/recovery confirmed

Share the Post:

Discover More Microsoft 365 Security Tips & Guides