Securing Microsoft 365: A Checklist for Small Business
Microsoft 365 is probably your most critical business system. Email, documents, collaboration - it’s all in there. And yet I regularly see small businesses running with the default settings, which aren’t as secure as you’d think.
Here’s a practical checklist to lock down your M365 environment. You don’t need an IT department to do most of this.
The Basics (Do These Today)
Enable Multi-Factor Authentication for Everyone
This is the single most important thing you can do. Go to the Microsoft 365 admin centre > Users > Active users > Multi-factor authentication and enable it for all accounts.
Better yet, use Security Defaults or Conditional Access policies to enforce it automatically.
How to check: Sign out and sign back in. Are you prompted for a second factor? If not, it’s not working.
Check Admin Account Security
Admin accounts are the crown jewels. If an attacker gets one, they control everything.
- Use a separate admin account from your daily account
- Never use admin accounts for regular email or web browsing
- Enable MFA specifically on all admin accounts (consider hardware keys for these)
- Review who has admin roles and remove anyone who doesn’t need them
Where to check: Admin centre > Users > Active users > Filter by “Admin”
Set Up Secure Password Policies
Microsoft 365 has default password policies, but you might want to tighten them:
- Minimum 14 characters (length matters more than complexity)
- Banned password list (prevents “Company2025!” type passwords)
- Self-service password reset (reduces IT burden and locked accounts)
Where to configure: Azure Active Directory > Security > Authentication methods
Email Security (Do These This Week)
Enable Anti-Phishing Policies
Microsoft 365 includes anti-phishing, but it’s not always configured aggressively.
- Go to Security & Compliance centre > Threat Management > Policy
- Enable impersonation protection (protects against spoofed executive emails)
- Configure safe links and safe attachments
- Enable first contact safety tips (warns when receiving email from new senders)
Configure DMARC, DKIM, and SPF
These email authentication protocols prevent attackers from spoofing your domain. They’re free to set up but require DNS changes.
- SPF: Specifies which mail servers can send email as your domain
- DKIM: Adds a digital signature to outgoing emails
- DMARC: Tells receiving servers what to do with emails that fail SPF/DKIM
Microsoft publishes guides for setting these up. If you’re not confident with DNS, ask your IT support.
How to check: Use a tool like MXToolbox to test your domain’s email authentication.
Block Auto-Forwarding
Attackers often set up mailbox rules to forward emails to external addresses. Block this:
- Exchange admin centre > Mail flow > Rules
- Create a rule to block auto-forward to external recipients
You can whitelist specific addresses if you have legitimate forwarding needs.
Check for Suspicious Mailbox Rules
Existing compromised accounts might already have forwarding rules.
How to check: Run the Get-InboxRule cmdlet in PowerShell for each user, or use the Microsoft 365 admin centre to review rules.
Look for rules that forward, redirect, or delete emails - especially if the user doesn’t remember creating them.
Data Protection (Do These This Month)
Enable Audit Logging
You can’t investigate what you don’t log. Turn on unified audit logging:
- Security & Compliance centre > Search > Audit log search
- Click “Start recording user and admin activity”
This should be on by default but verify it.
Configure Retention Policies
Decide how long emails and documents should be kept, then enforce it:
- How long do you legally need to retain records?
- When should data be automatically deleted?
- Are there holds needed for legal or compliance reasons?
Where to configure: Security & Compliance centre > Information governance > Retention
Set Up Data Loss Prevention (DLP)
DLP policies can prevent sensitive information from leaving your organisation:
- Block emails containing credit card numbers to external recipients
- Warn before sharing documents containing sensitive data
- Flag bulk downloads of customer information
Start with Microsoft’s built-in sensitive information types (credit cards, tax file numbers, Medicare numbers).
Where to configure: Security & Compliance centre > Data loss prevention
Review External Sharing Settings
Who can share files and folders externally? By default, it might be everyone.
- SharePoint admin centre > Policies > Sharing
- Consider limiting external sharing to specific users or requiring approval
- At minimum, disable anonymous sharing links
Device and Access Controls (Do These)
Configure Conditional Access
Conditional Access lets you require MFA, block access, or limit capabilities based on conditions:
- Require MFA for admin access
- Block access from risky locations
- Require compliant devices for sensitive data
- Force MFA when sign-in risk is detected
Where to configure: Azure Active Directory > Security > Conditional Access
Note: Some Conditional Access features require Azure AD Premium licensing.
Enable Mobile Device Management
If people access M365 from phones, consider basic MDM:
- Require a device PIN
- Enable remote wipe for lost devices
- Block access from jailbroken devices
Microsoft Intune is included in Business Premium and provides these controls.
Review Third-Party App Permissions
Users might have granted access to third-party apps. Some are legitimate; others are phishing vectors.
Where to check: Azure Active Directory > Enterprise applications > All applications
Review the list. For each app, check what permissions it has. Remove anything you don’t recognise or no longer use.
Ongoing Maintenance
Review the Secure Score
Microsoft provides a security score with specific recommendations:
- Security centre > Secure score
- Review each recommendation
- Implement what makes sense for your business
Don’t aim for 100% - some recommendations might not apply to you. But if you’re below 50%, you’ve got work to do.
Enable Alerts
Set up alerts for suspicious activity:
- Security & Compliance centre > Alerts > Alert policies
- Enable notifications for impossible travel, suspicious inbox rules, malware detection
Decide who receives alerts and how quickly they’ll respond.
Schedule Quarterly Reviews
Every three months, review:
- Who has admin access (still needed?)
- Which third-party apps have permissions
- Any unusual activity in audit logs
- Updated recommendations in Secure Score
If You Need Help
This checklist covers the essentials, but Microsoft 365 security can go deeper. If you need help:
- Microsoft publishes excellent documentation at docs.microsoft.com
- Consider a Microsoft 365 security assessment from a qualified partner
- For complex environments, working with AI consultants Sydney or similar specialists can help automate monitoring and response
The defaults are a starting point, not a finish line. Every setting you tighten makes an attacker’s job harder.
Your business runs on Microsoft 365. Secure it like it matters.