Microsoft 365 is powerful—and because it’s so common, it’s also a top target. The good news: a handful of settings can dramatically reduce account takeovers, email impersonation, and data exposure.
Here are 10 high-impact Microsoft 365 security settings to review.
1) Turn on MFA for every user (no exceptions)
Require multi-factor authentication for all accounts, especially admins. If you only do one thing, do this.
2) Protect admin accounts with stronger controls
Use separate admin accounts (not daily-use inboxes) and enforce the strictest sign-in rules for them.
3) Disable legacy authentication
Older sign-in methods (like basic auth) are frequently abused. Block legacy authentication to reduce password-spray risk.
4) Review Conditional Access policies
If you have Entra ID (Azure AD) Conditional Access, use it to:
- Block sign-ins from risky locations
- Require MFA outside trusted networks
- Require compliant devices for sensitive apps
5) Enable security defaults (if you don’t have Conditional Access)
For smaller environments, Microsoft’s Security Defaults can provide a solid baseline quickly.
6) Set up SPF, DKIM, and DMARC for your domain
These help prevent spoofing and improve deliverability.
- SPF: who can send as your domain
- DKIM: proves messages weren’t altered
- DMARC: tells receivers what to do when checks fail
7) Tighten external email and anti-phishing policies
In Microsoft Defender for Office 365 (or Exchange Online Protection), review:
- Anti-phishing policies (impersonation protection)
- Anti-spam policies
- Safe Links/Safe Attachments (if licensed)
8) Block auto-forwarding to external addresses
Attackers love setting mailbox rules that auto-forward email out of your tenant. Disable external auto-forwarding unless there’s a documented business need.
9) Audit mailbox rules and suspicious sign-ins
Check for:
- New inbox rules you didn’t create
- “Delete,” “Archive,” or “Mark as read” rules on finance/executive mailboxes
- Sign-ins from unusual locations/devices
10) Set retention and recovery basics
Make sure you can recover from mistakes or malicious deletes.
- Confirm deleted item retention settings
- Use retention policies where appropriate
- Know how to restore a user and mailbox quickly
Quick checklist (copy/paste)
- MFA enabled for all users and admins
- Separate admin accounts in place
- Legacy authentication blocked
- Conditional Access or Security Defaults enabled
- SPF/DKIM/DMARC configured
- Anti-phishing and anti-spam policies reviewed
- External auto-forwarding blocked
- Mailbox rules audited
- Sign-in logs reviewed
- Retention/recovery confirmed

