...

Microsoft 365 security hardening guide

Table of Contents

Executive Summary
What is Microsoft 365 security hardening?
The biggest Microsoft 365 risks for UK SMEs
Step-by-step hardening checklist

The checklist follows a step by step order starting with Identity/Email, Data, and Monitoring. You can find what you need in either Microsoft 365 Admin Center (admin.microsoft.com) or the Security Portal (security.microsoft.com)

Identity & Access Security
Email & Phishing Protection
SharePoint & OneDrive Security
Device & Endpoint Integration
Logging, Monitoring & Alerting
Backup & Data Recovery
Common configuration mistakes
30-60-90 day hardening roadmap

1-30 days: Create an initial foundation

31-60 days: Protection and monitoring

61-90 days: Advanced and review

FAQs

Yes however they will require configuration to enable many of the critical protections that exist.

Many of the advanced protections require you to be on a higher version of the Microsoft 365 security plans.

MFA is certainly a key solution, however this should be combined with other controls that exist.

There are many attacks that are launched via automation that affect all types and sizes of organisations.

Quarterly is a reasonable starting point for reviewing your current security settings.

About This Guide

The Computer Support Centre is an IT support and Cyber Security provider based in the UK. They assist small and medium sized businesses improve their security within their Microsoft 365 Platforms. The goal of this document is to provide solid, clear and uncomplicated advice to business owners, company directors and IT Managers who need to be assured that their Microsoft 365 infrastructure is secured appropriately. This document is not intended to be overly technical, but instead will help provide guidance on the most important configuration steps, common risks, and realistic controls that organisations can implement in order to reduce their cyber security risks, and protect their data.

If your company would like to complete a structured Microsoft 365 Security Assessment Computer Support Centre can review your current configuration and make specific recommendations for improvement, and ensure that your environment meets the best practice guidelines from the UK.

Conclusion

While Microsoft 365 is generally regarded as an effective and secure system/platform, much of its security relies on proper deployment/configuration. Most security incidents affecting small- and medium-sized businesses occur due to non-sophisticated types of attacks, with the majority of incidents stemming from gaps in security, for example, not implementing multi-factor authentication (MFA), giving too many admin rights to employees or using too many open sharing settings).

Security hardening is about closing those gaps. By improving the overall protection for identities, email filtering, file sharing control, monitoring for suspicious behaviour and completing an adequate backup and recovery plan, UK SME businesses can reduce the likelihood of falling victim to phishing scams, ransomware and/or compromised accounts.

Security is not a one-time job. Conducting ongoing security reviews, providing staff with security awareness training and aligning your efforts with best practice recommendations like Cyber Essentials and the National Cyber Security Centre’s guidance will ensure your Microsoft 365 environment remains resilient as your organisation scales.