Link copied to clipboard!
Microsoft 365

Microsoft 365 Security Checklist: 100 Settings Every IT Administrator Must Review

Sreenivasa Reddy G
Sreenivasa Reddy G
Founder & CEO
Mar 13, 202620 min read
24
Microsoft 365 Security Checklist: 100 Settings Every IT Administrator Must Review

Managing a Microsoft 365 tenant means managing hundreds of security and compliance settings across Entra ID, Exchange Online, SharePoint, Teams, Defender, Purview, and Intune. Miss one critical setting and you've got an attack surface you didn't know existed. Over-configure another and you've broken a workflow that 200 employees depend on.

This checklist organizes 100 settings into 10 categories. For each setting, we include the risk level if misconfigured, the license tier required, and the admin portal where you'll find it. Use this as your annual M365 security audit template. For detailed implementation guidance on the highest-impact settings, see our M365 Security Hardening Guide with step-by-step instructions.

Category 1: Identity and Authentication (20 Settings)

# Setting Risk License
1MFA enforced for all users via Conditional Access or Security DefaultsCriticalAny
2Legacy authentication protocols blockedCriticalBusiness Premium+
3Global Admin accounts limited to 2-4CriticalAny
4Emergency (break-glass) accounts created and securedCriticalAny
5Admin accounts use separate credentials (not daily-use accounts)HighAny
6Privileged Identity Management (PIM) enabled for admin rolesHighEntra ID P2 (E5)
7Sign-in risk policy configured (block high, require MFA for medium)HighEntra ID P2
8User risk policy configured (require password change for high risk)HighEntra ID P2
9Custom banned password list configuredMediumEntra ID P1+
10Self-service password reset (SSPR) enabled with MFA verificationMediumEntra ID P1+
11Conditional Access: require compliant device for M365 accessHighBusiness Premium+
12Conditional Access: block access from untrusted locations for adminsHighBusiness Premium+
13Named/trusted locations defined (office IPs, VPN ranges)MediumBusiness Premium+
14User consent to third-party apps disabled (admin approval required)CriticalAny
15Guest user access restricted to own profile and shared resourcesMediumAny
16Access reviews configured (quarterly for admin roles and groups)MediumEntra ID P2
17Session lifetime policies configured (re-auth every 12-24 hours)MediumBusiness Premium+
18Continuous Access Evaluation (CAE) enabledMediumE3+
19PowerShell access restricted to admin accounts onlyHighBusiness Premium+
20FIDO2 security keys enabled for admin accountsMediumAny

Category 2: Email Security (15 Settings)

# Setting Risk License
21SPF record configured correctly for all sending domainsCriticalAny
22DKIM signing enabled for all domainsHighAny
23DMARC policy set to p=reject (or p=quarantine minimum)HighAny
24Safe Links policy enabled (URL rewriting and time-of-click scanning)HighDefender P1+ (E5)
25Safe Attachments policy enabled (Dynamic Delivery mode)HighDefender P1+ (E5)
26Anti-phishing policy with impersonation protection for executivesHighDefender P2 (E5)
27External email auto-forwarding disabled at transport levelCriticalAny
28External sender tagging enabled ("[External]" banner on emails)MediumAny
29Mailbox audit logging verified as enabledHighAny
30Spam filter tuned (connection filter, content filter, outbound filter)MediumAny
31Common attachment types blocked (.exe, .bat, .ps1, .vbs, .js)HighAny
32Zero-hour auto purge (ZAP) enabledHighAny
33Mail flow rules audited (no unauthorized bypass rules)HighAny
34Automated investigation and response (AIR) enabledMediumDefender P2 (E5)
35Attack simulation training configured with monthly campaignsMediumDefender P2 (E5)

Category 3: Data Protection and Compliance (15 Settings)

# Setting Risk License
36Unified Audit Log enabled with maximum retentionCriticalAny (E5 for 1yr)
37DLP policies for PII (SSN, credit cards, driver's license)HighE3+
38DLP policies for industry data (PHI for HIPAA, PCI for payment card)CriticalE3+
39Sensitivity labels created and published (Confidential, Internal, Public)HighE3+
40Auto-labeling policies for sensitive content typesMediumE5
41Retention policies for email (1-7 years per compliance needs)HighE3+
42Retention policies for Teams, SharePoint, OneDriveMediumE3+
43eDiscovery search permissions restricted to legal/compliance teamMediumE3+
44Customer Lockbox enabledMediumE5
45Insider Risk Management policies configuredMediumE5 Compliance
46Communication compliance policies for regulated industriesMediumE5 Compliance
47Information barriers configured (if required — finance, legal)MediumE5
48Alert policies for sensitive admin actionsHighAny
49Data classification content explorer reviewedMediumE5
50Compliance Manager assessment score reviewed and action items addressedMediumE3+

Category 4: SharePoint and OneDrive (10 Settings)

# Setting Risk License
51External sharing restricted to "New and existing guests" (not "Anyone")CriticalAny
52Guest sharing links expire after 30 days maximumHighAny
53OneDrive sync restricted to managed devices onlyHighAny
54SharePoint site creation restricted to adminsMediumAny
55File type restrictions (block .exe, .ps1, .bat uploads)MediumAny
56Versioning enabled on all document libraries (30+ versions)MediumAny
57IRM (Information Rights Management) enabled for sensitive librariesMediumE3+
58SharePoint access restricted from unmanaged devices (app enforced restrictions)HighBusiness Premium+
59Site permissions audited — no orphaned accessMediumAny
60Idle session sign-out configuredMediumAny

Category 5: Teams (10 Settings)

# Setting Risk License
61External access restricted to specific allowed domains (not "open")HighAny
62Guest access in Teams limited (disable screen sharing, whiteboard for guests)MediumAny
63Anonymous meeting join disabled or lobby-requiredHighAny
64Meeting recording auto-expiration set (120 days default)MediumAny
65Third-party app installation restricted (admin-approved apps only)HighAny
66Teams creation restricted to specific security groupMediumAny
67Channel moderation policies for compliance-sensitive channelsMediumAny
68Meeting chat retention aligned with email retention policyMediumE3+
69Live captions and transcription policies reviewed for complianceLowAny
70Copilot governance configured (if deployed)HighCopilot license

Category 6: Device Management — Intune (10 Settings)

# Setting Risk License
71Device compliance policies enforce BitLocker encryptionCriticalBusiness Premium+
72Device compliance requires firewall enabled and AV currentHighBusiness Premium+
73Device compliance requires minimum OS versionHighBusiness Premium+
74App protection policies for iOS/Android (prevent copy to personal apps)HighBusiness Premium+
75Windows Autopatch or Windows Update for Business configuredHighBusiness Premium+
76Local admin account management (LAPS or admin account disabled)HighBusiness Premium+
77Application control policy (block unauthorized software installs)MediumBusiness Premium+
78Remote wipe capability configured for all managed devicesMediumBusiness Premium+
79Defender for Endpoint onboarded to all Windows endpointsHighBusiness Premium / E5
80Non-compliant devices blocked from M365 access (Conditional Access + compliance)HighBusiness Premium+

Category 7: Cloud Security — Defender for Cloud Apps (5 Settings)

# Setting Risk License
81Cloud App Discovery enabled (shadow IT detection)HighE5 / MCAS add-on
82Anomaly detection policies configured (impossible travel, mass download)HighE5
83App connectors configured for key SaaS (Salesforce, Dropbox, etc.)MediumE5
84Session controls for BYOD users (prevent download on unmanaged devices)HighE5
85OAuth app governance: unsanctioned apps blockedHighE5

Category 8: Azure and Hybrid Identity (5 Settings)

# Setting Risk License
86Azure AD Connect health monitoring enabled (hybrid environments)HighEntra ID P1+
87Password hash sync enabled (even with federation, as backup)HighAny
88Defender for Identity installed on domain controllersHighE5
89Cross-tenant access settings configured for partner organizationsMediumAny
90Defender for Cloud enabled for Azure subscriptionsHighAzure subscription

Category 9: Monitoring and Alerting (5 Settings)

# Setting Risk License
91Alert for new Global Admin role assignmentCriticalAny
92Alert for Conditional Access policy modification/deletionCriticalAny
93Alert for mail flow rule creation/modificationHighAny
94Alert for OAuth app consent grantHighAny
95Microsoft Secure Score reviewed monthly (target: 80%+)HighAny

Category 10: Backup and Recovery (5 Settings)

# Setting Risk License
96Third-party M365 backup solution deployed (Veeam, Druva, Spanning)CriticalThird-party
97Backup covers Exchange, SharePoint, OneDrive, and TeamsCriticalThird-party
98Backup restore tested within last 90 daysCriticalThird-party
99Deleted user retention period understood (30 days in Entra ID)MediumAny
100Recovery procedures documented for tenant-level compromise scenarioHighAny

Summary: Risk Distribution

Risk Level Settings Count Priority
Critical15Implement within 48 hours — these are active attack vectors
High42Implement within 30 days — significant risk reduction
Medium42Implement within 90 days — defense in depth
Low1Implement when convenient — minimal risk

How to Use This Checklist

Annual audit: Run through all 100 settings once per year. Export your Microsoft Secure Score, compare to this list, and document gaps. Assign remediation owners and deadlines.

New tenant setup: Use the Critical and High settings as your deployment baseline. No M365 tenant should go into production without the 15 Critical settings implemented.

Compliance preparation: Use this checklist when preparing for cyber insurance applications, SOC 2 audits, HIPAA assessments, or other compliance reviews. Each setting maps to common compliance framework controls.

MSP client onboarding: MSPs and white-label providers should use this checklist during client onboarding to baseline the tenant's security posture and identify remediation work.

For step-by-step implementation guidance on the top 50 settings, see our M365 Security Hardening Guide. If you need hands-on help with your M365 security configuration, our managed IT team provides tenant security audits and hardening services for organizations of all sizes.

Advanced security and device management for businesses that need more than the basics.

Get M365 Business Premium

Topics

Microsoft 365Security ChecklistIT AdminComplianceM365 Audit
Sreenivasa Reddy G
Written by

Sreenivasa Reddy G

Founder & CEO15+ years

Sreenivasa Reddy is the Founder and CEO of Medha Cloud, recognized as "Startup of the Year 2024" by The CEO Magazine. With over 15 years of experience in cloud infrastructure and IT services, he leads the company's vision to deliver enterprise-grade cloud solutions to businesses worldwide.

Managed IT SupportCloud InfrastructureDigital Transformation
Follow on LinkedIn

Need Expert Help?

Our team of cloud and IT experts is ready to help you solve your toughest challenges. Get personalized assistance today.