Microsoft 365 Security

How to Harden Your Microsoft 365 Tenant: Complete Guide

Microsoft 365 is not secure by default. Default settings prioritise ease of access over security — allowing legacy authentication, permitting any device to access email, and leaving many security features disabled. Hardening your M365 tenant means changing these defaults to close the gaps attackers routinely exploit.

Call 0333 733 8050

Overview

Microsoft 365 default settings prioritise ease of access over security. Hardening your M365 tenant means configuring Conditional Access, blocking legacy authentication, deploying Defender for Business correctly, applying anti-phishing policies, and securing admin accounts with PIM. Microsoft Secure Score tracks progress against recommended settings.

Learn about M365 security

Why M365 Is Not Secure by Default

Microsoft 365 is designed for ease of deployment and broad compatibility — it ships with default settings that work for the widest range of environments, which means prioritising accessibility over security. Legacy authentication protocols are enabled. Any device with valid credentials can access email. The most powerful admin roles are permanently assigned rather than time-limited. Audit logging may not be configured to retain events long enough for forensic investigation.

These defaults are not a Microsoft failure — they reflect deliberate design choices for ease of use. But for businesses that have not deliberately hardened their M365 tenant, these defaults represent significant attack surface. Many of the most common Microsoft 365 attacks — password spray, legacy protocol credential stuffing, OAuth application abuse — exploit exactly these default settings.

Identity Hardening

Identity hardening starts with Conditional Access. AMVIA deploys a baseline set of Conditional Access policies that require MFA for all users, block legacy authentication protocols, require device compliance for access to sensitive applications, and apply additional protection to admin accounts. These policies together address the most common identity-based attack vectors.

Admin account security is a separate focus area. Permanent Global Administrator access is a significant security risk — an attacker who compromises a permanent Global Admin account has unrestricted access to your entire M365 tenant. Privileged Identity Management (PIM) replaces permanent admin assignment with just-in-time elevation — admin roles are activated only when needed, for a limited time, with approval workflow and full audit logging. AMVIA configures PIM for all admin accounts as part of M365 hardening.

Email Security Hardening

Exchange Online Protection is active by default, but default policies are not optimal. Anti-phishing policies should be configured with impersonation protection enabled for key executives and commonly impersonated domains. Safe Links and Safe Attachments (included in Business Premium) should be enabled with appropriate settings — not left at defaults. DKIM signing for your domain should be enabled. A DMARC policy should be deployed and advanced to enforcement.

Outbound spam policies should be configured to detect and block behaviour consistent with a compromised account sending spam — an important early indicator of an account takeover that most businesses do not have configured.

Endpoint Hardening

Defender for Business configuration goes well beyond simply enabling the product. Attack surface reduction rules should be enabled at appropriate levels — many are off by default or in audit-only mode. Controlled folder access protects against ransomware by blocking unauthorised processes from modifying files in protected directories. Network protection blocks connections to known malicious domains. These configurations are not enabled by default and require deliberate setup.

Data and Compliance Hardening

SharePoint external sharing defaults are often too permissive — allowing documents to be shared with anyone who has the link, including anonymous access. AMVIA reviews and restricts external sharing policies to require authenticated sharing only, and removes anonymous link sharing unless there is a specific business case for it. Teams external access and guest access settings are reviewed for the same reason.

Audit logging should be enabled and configured with appropriate retention. Microsoft 365 audit logs are essential for forensic investigation of security incidents — without them, investigating a compromise becomes significantly harder. The default audit log retention in Microsoft 365 Business Premium is 90 days; some compliance requirements may necessitate longer retention through Microsoft Purview.

Key Considerations for UK SMEs

  • Review Microsoft Secure Score as a starting point — it provides an ordered list of improvements with implementation guidance
  • Prioritise MFA enforcement, legacy authentication blocking, and admin account PIM above other hardening steps
  • Use report-only mode for Conditional Access policies before enforcement — understand the impact before blocking users
  • Document changes made during hardening — a record of configuration decisions supports audit and troubleshooting
  • Re-assess Secure Score quarterly — new recommendations are added as Microsoft identifies new risks

How AMVIA Can Help

AMVIA hardens Microsoft 365 tenants as a structured engagement for new clients and as an ongoing service for managed clients. The process starts with a current configuration review against Microsoft's Secure Score and NCSC guidance, followed by a prioritised remediation plan. AMVIA implements changes during agreed maintenance windows, documents all configuration changes, and provides a post-hardening Secure Score comparison. Ongoing quarterly reviews ensure the tenant stays hardened as Microsoft adds new recommendations and as the business's environment evolves. Contact AMVIA on 0333 733 8050.

Key Points

What M365 hardening covers for UK businesses.

Default Settings Create Risk

Legacy authentication is enabled by default. Basic MFA can be bypassed. Admin accounts have permanent elevated permissions. All of these are commonly exploited.

Hardening Is Configuration, Not Cost

Most M365 hardening changes require no additional licensing — just deliberate configuration of settings already available in your existing licence.

Secure Score Measures Progress

Microsoft Secure Score provides a numerical score and an ordered list of improvement actions — making it easy to prioritise and track hardening progress.

Supports Cyber Essentials

Correctly hardened M365 configuration satisfies several Cyber Essentials controls — access control, secure settings, malware protection — making CE certification more straightforward.

M365 Hardening Checklist

Conditional Access — MFA required for all users, legacy authentication blocked

Admin accounts protected with PIM — just-in-time elevation, no permanent Global Admin

Anti-phishing policy — impersonation protection for key executives and domains

Safe Links and Safe Attachments enabled with appropriate policies

DKIM and DMARC configured and DMARC in enforcement mode

SharePoint external sharing restricted — no anonymous link sharing without business justification

Defender for Business — ASR rules enabled, not in audit-only mode

Audit logging enabled with appropriate retention period

Frequently Asked Questions

Harden Your Microsoft 365 Tenant

AMVIA reviews your M365 configuration, implements Microsoft's recommended security baseline, and maintains your tenant against new recommendations on an ongoing basis.