Top 10 Office365 Security Recommendations
It seems Microsoft’s Office365/Microsoft365 cloud service offerings have taken the world by storm. According to Statista in February of 2022, 46% of organizations worldwide are using this cloud service or a hybrid version of it.
Although improved security is a potential reason why organizations are turning to cloud-based services, many of the security features available in O365/M365 are not enabled be default. Mile High Cyber recommends these “Top 10” security configuration settings for organizations wanting to benefit from Microsoft’s built-in security features:
Turn-on auditing (or ensure it’s already on)
Enforce Multi-factor Authentication (MFA) for all administrators, then all users
Create separate administrator accounts for admin activities
Set a strong password policy and identify banned passwords
Specify failed lockout threshold and duration
Add external email warning banner
Configure DMARC/DKIM/SPF for email
Disable user consent to apps
Monitor logins, failed logins, and risky logins
Configure security alerts for high-interest events
Finally, Mile High Cyber recommends organizations periodically review Microsoft’s “SecureScore” for ideas on additional security improvements, which are constantly changing (OK…that’s 11 security recommendations).
For help configuring your Office365 / Microsoft365 tenant or security testing/vulnerability assessment in general, contact us here.