Microsoft 365 is powerful but not secure by default. Here is how to configure it properly to protect your business data, email, and accounts.
Microsoft 365 is the most widely used business platform in Australia — and one of the most targeted by attackers. The default configuration of a new Microsoft 365 tenant is not secure. It is functional, and some baseline protections are in place, but significant gaps exist that need to be deliberately closed.
This guide covers the security configuration steps that every Melbourne business using Microsoft 365 should implement. For each item, we include where to find the setting in the admin centre.
Priority 1: Identity Security
Enable Multi-Factor Authentication for All Users
MFA prevents credential theft from translating into account takeover. A stolen password without MFA is a complete account compromise. A stolen password with MFA is a failed attack.
How to configure: Entra admin centre (entra.microsoft.com) → Protection → Conditional Access → New Policy → Require MFA for all users, all apps.
Do not rely on per-user MFA settings (the legacy approach) — Conditional Access policies are more flexible and provide better control.
MFA methods, in order of security:
- FIDO2 hardware key (phishing-resistant — best for admins and finance)
- Windows Hello for Business (phishing-resistant — best for managed Windows devices)
- Microsoft Authenticator with number matching (good for standard users)
- TOTP authenticator app (adequate)
- SMS (weakest — avoid for business accounts)
Enable Number Matching in Microsoft Authenticator
Without number matching, push MFA notifications can be approved accidentally or through MFA fatigue attacks. Number matching requires users to confirm a number shown on the login screen matches a number in the app — preventing automated approval.
How to configure: Entra admin centre → Protection → Authentication methods → Microsoft Authenticator → Enable number matching.
Block Legacy Authentication
Legacy authentication protocols (basic auth) do not support MFA. Any account that can authenticate via legacy auth can be accessed with just a username and password, bypassing Conditional Access entirely.
How to configure: Entra admin centre → Protection → Conditional Access → New Policy → Condition: Client apps = “Exchange ActiveSync clients” and “Other clients” → Grant: Block access.
Configure Admin Accounts Properly
Admin accounts should:
- Be separate from daily-use accounts (an admin should have a separate admin@company.com account used only for admin tasks)
- Require MFA with phishing-resistant methods
- Never be used for email, web browsing, or general tasks
- Be enrolled in Privileged Identity Management for just-in-time access
Priority 2: Email Security
Configure DMARC, DKIM, and SPF
Email authentication prevents your domain from being spoofed in phishing attacks against your clients and staff.
SPF: DNS TXT record specifying authorised sending servers. For M365: v=spf1 include:spf.protection.outlook.com -all
DKIM: Enabled in Microsoft 365 Defender → Email & Collaboration → Policies → Email authentication settings → DKIM. Requires publishing two CNAME records in DNS.
DMARC: DNS TXT record at _dmarc.yourdomain.com.au. Start with p=none for monitoring, move to p=quarantine then p=reject.
Enable Safe Links and Safe Attachments
Microsoft Defender for Office 365 (included in M365 Business Premium) provides:
- Safe Links: Rewrites URLs in emails and checks them at click time — blocks malicious links even if the site was not malicious at delivery time
- Safe Attachments: Detonates email attachments in a sandbox before delivery — catches zero-day malware
How to configure: Microsoft 365 Defender → Email & Collaboration → Policies & Rules → Threat policies → Safe Links and Safe Attachments.
Anti-Phishing Policies
Configure anti-impersonation protection for your senior staff and commonly impersonated domains:
How to configure: Microsoft 365 Defender → Email & Collaboration → Policies & Rules → Threat policies → Anti-phishing → Edit default policy → Add protected users (senior staff email addresses) and protected domains.
Priority 3: Endpoint Security
Deploy Microsoft Defender for Endpoint
M365 Business Premium includes Microsoft Defender for Business — a full endpoint detection and response (EDR) solution. It must be configured and deployed; it does not activate automatically.
How to configure: Microsoft 365 Defender → Settings → Endpoints → Onboarding. Deploy via Intune to all managed devices.
Enable BitLocker on All Devices
Full-disk encryption ensures that a lost or stolen laptop does not result in a data breach.
How to configure via Intune: Intune admin centre (intune.microsoft.com) → Endpoint security → Disk encryption → Create policy → Windows → BitLocker.
This policy deploys automatically to all enrolled Windows devices and stores recovery keys in Entra ID.
Priority 4: Data Protection
Enable Sensitivity Labels
Sensitivity labels (Public, Internal, Confidential, Highly Confidential) allow documents and emails to be classified and protected. Confidential labels can prevent copy-paste, printing, or external sharing.
How to configure: Microsoft Purview compliance portal → Information protection → Labels.
Configure External Sharing Policies
SharePoint and OneDrive default sharing settings are often too permissive for business use. Review and restrict:
How to configure: SharePoint admin centre → Policies → Sharing. Set external sharing to “New and existing guests” or “Only people in your organisation” depending on your collaboration requirements.
Enable Audit Logging
Audit logging captures user and admin activity — essential for incident investigation and compliance. Verify it is active.
How to configure: Microsoft Purview → Audit → Confirm auditing is turned on for your tenant.
Priority 5: Security Score Monitoring
Microsoft Secure Score provides a consolidated score of your M365 security posture with specific, prioritised recommendations.
Where to find it: Microsoft 365 Defender → Secure Score.
Aim for a score above 60% as an initial target. Review monthly and implement the highest-priority recommendations progressively.
Getting Properly Configured
Implementing all of these settings correctly requires technical knowledge and careful testing to avoid disrupting legitimate workflows. CX IT Services configures Microsoft 365 security as part of our onboarding process for all managed IT clients. Book a Right Fit Call to discuss your current M365 security configuration.