More

    Basic Microsoft 365 Security Improvements

    Overview

    Securing Microsoft 365 tenants involves implementing various measures to protect data, prevent unauthorized access, and mitigate potential threats. There are several different improvements you can make, with different levels of complexity. In this article, we’re going to focus on several basic improvements that have the most valuable outcomes. These suggestions are based on having Entra ID P1 and Defender for Office Plan 1. The suggestions are focused on Identity Protection, Email Security, and Application Security.

    By following these security recommendations, you can enhance the basic security posture of your Microsoft 365 tenant and better protect your organization’s data and resources.

    Identity Protection

    Enable Conditional Access to Block Legacy Authentication

    Legacy authentication does not support multifactor authentication (MFA). Even if an MFA policy is configured in your environment, bad actors can bypass these enforcements through legacy protocols.

    • Sign in to the Microsoft Entra Admin portal.
    • Browse to Protection > Conditional Access.
    • Select Create new policy.
    • Give your policy a name.
    • Under Assignments, select Users or workload identities.
    • Under Include, select All users.
    • Under Target resources > Cloud apps > Include, select All cloud apps.
    • Under Conditions > Client apps, set Configure to Yes.
    • Check only the boxes Exchange ActiveSync clients and Other clients.
    • Under Access controls > Grant, select Block access.
    • Confirm your settings and set Enable policy to On.
    • Select Create to create to enable your policy.

    Enable Conditional Access to Require MFA

    Multifactor authentication (MFA) helps protect devices and data that are accessible to these users. Adding more authentication methods, such as the Microsoft Authenticator app or a phone number, increases the level of protection if one factor is compromised.

    • Sign in to the Microsoft Entra Admin portal.
    • Browse to Protection > Conditional Access.
    • Select Create new policy.
    • Give your policy a name.
    • Under Assignments, select Users or workload identities.
    • Under Include, select All users
    • Under Exclude, select Users and groups and choose your organization’s emergency access or break-glass accounts.
    • Under Target resources > Cloud apps > Include, select All cloud apps.
    • Under Access controls > Grant, select Grant access, Require multifactor authentication, and select Select.
    • Confirm your settings and set Enable policy On.
    • Select Create to create to enable your policy.

    Set Passwords to Never Expire

    Research has found that forcing most users to change their passwords periodically results in users choosing weaker passwords. Its recommended to set passwords to never expire.

    In the Microsoft 365 admin center, go to Settings > Org Settings > Security & privacy > Password expiration policy. Then check the box “Set passwords to never expire (recommended)”.

    A screenshot of a computer

Description automatically generated

    Enable Self-Service Password Reset

    Self-service password reset in Microsoft Entra ID allows users to manage their own password. Users no longer need to engage a help desk to reset passwords, and allows them to reset their password as needed.

    • Sign in to the Microsoft Entra admin center.
    • Browse to Protection > Password reset from the menu on the left side.
    • From the Properties page, under the option Self service password reset enabled, choose All.
    • Select Save
    A screenshot of a computer

Description automatically generated

    Email Protection

    Adjust Advanced Phishing Threshold

    A higher Advanced phishing threshold value applies more severe actions on phishing detections.

    In the Microsoft Defender portal, navigate to the Email & Collaboration > Policies & Rules > Threat Policies > Anti-phishing policies.

    Open the Office365 AntiPhish Default policy. Edit protection settings.

    Change ‘Advanced phishing thresholds’ from ‘1’ to ‘3’

    Enable Intelligence for Impersonation Protection

    In the Microsoft Defender portal, navigate to the Email & Collaboration > Policies & Rules > Threat Policies > Anti-phishing policies.

    Open the Office365 AntiPhish Default policy. Edit protection settings.

    Change ‘Enable Intelligence for impersonation protection (Recommended)’ from ‘False’ to ‘True’

    A close-up of a white background

Description automatically generated

    A screenshot of a computer

Description automatically generated

    Ensure that all users have an assigned anti-phishing policy with ‘Enable domains to protect’, ‘Include domains I own’ and ‘Include custom domains’ options enabled, by either updating your existing policies or creating new ones.

    Adjust Anti-SPAM Threshold

    In the Microsoft Defender portal, navigate to the Email & Collaboration > Policies & Rules > Threat Policies > Anti-spam policies.

    Open the Block Domain policy (repeat for the Anti-spam inbound policy (Default) policy as well).

    Change ‘Bulk email threshold’ from ‘7’ to ‘6’

    A white background with black text

Description automatically generated

    Enable External Message Tagging

    External Tagging adds a tag to any email message sent from an external domain. This makes it easier for users to identify a potentially malicious email.

    Steps to Enable

    Run Windows PowerShell as administrator and connect to Exchange Online PowerShell.

    PS C:\> Connect-ExchangeOnline

    Enable external sender identification in supported versions of Outlook. Run the Set-ExternalInOutlook cmdlet.

    PS C:\> Set-ExternalInOutlook -Enabled $true

    Now that it’s enabled, you can verify by running the Get-ExternalInOutlook cmdlet.

    PS C:\> Get-ExternalInOutlook | Format-Table

    Enabled: True means the feature is enabled; False means the feature is disabled.

    Application Protection

    Ensure User Consent to Apps is Not Allowed

    To reduce the risk of malicious applications attempting to trick users into granting them access to your organization’s data, it’s recommended that you allow user consent only for applications that a verified publisher has published.

    • Go to Microsoft Entra ID > Enterprise applications > Consent and permissions. Go to Consent and permissions
    • Select “Allow user consent for apps from verified publishers, for selected permissions (Recommended)“ Configure the low-impact permissions that users are allowed to consent to. Click “Select permissions to classify as low impact”.
    A white background with black text

Description automatically generated

    Recent Articles

    Security Trends – Q2 2024

    Small businesses are under increasing cyberattack threat. The global cost of cybercrime is predicted to skyrocket, reaching a staggering $23.84 trillion by...

    Basic Microsoft 365 Security Improvements

    Overview Securing Microsoft 365 tenants involves implementing various measures to protect data, prevent unauthorized access, and mitigate potential...

    Cyber Security Trends for 2024

    Summary The state of cybersecurity in 2024 reflects a dynamic and complex landscape shaped by technological advancements,...

    Content Filtering with Microsoft Defender for Endpoint

    Why is Content Filtering Important? Web content filtering is a critical element of a comprehensive information security strategy.

    Migrating to Azure AD Authentication Methods

    Azure AD Authentication Changes On September 30th, 2024, the legacy multifactor authentication and...

    Related Stories

    0 0 vote
    Article Rating
    Subscribe
    Notify of
    guest
    0 Comments
    Inline Feedbacks
    View all comments

    Stay on op - Ge the daily news in your inbox

    0
    Would love your thoughts, please comment.x
    ()
    x