Top 10 Microsoft 365 Security Misconfigurations: Full Guide to Fixing Common Risks Step-by-Step
top of page
Search

Top 10 Microsoft 365 Security Misconfigurations: Full Guide to Fixing Common Risks Step-by-Step

  • Hanna Korotka
  • 1 day ago
  • 3 min read

ree

Microsoft 365 Security Misconfigurations are one of the most common causes of data breaches, ransomware infections, and compliance failures. Whether you're a small business, enterprise, or nonprofit, misconfigured settings can leave your organization exposed.


This step-by-step guide walks you through the top 10 misconfigurations we frequently encounter—and how to fix them to strengthen your security posture.


1. Missing Multi-Factor Authentication (MFA) for Admins


Why it matters: Admin accounts are high-value targets for attackers.


How to fix it:

  1. Go to Microsoft Entra admin center.

  2. Navigate to Conditional Access > Policies.

  3. Create a new policy targeting admin roles: Under Assignments, select Users or workload identities.

    1. Under Include, select Directory roles and choose at least the previously listed roles.

    2. Under Exclude, select Users and groups and choose your organization's emergency access or break-glass accounts.

  4. Under Target resources > Resources (formerly cloud apps) > Include, select All resources (formerly 'All cloud apps').

  5. Set Grant access > Require multi-factor authentication.

  6. Enable and test the policy.


2. Overly Permissive External Sharing Settings


Why it matters: Sensitive files can be accidentally exposed.


How to fix it:

  1. Open Microsoft 365 Admin Center.

  2. Go to SharePoint Admin Center > Policies > Sharing.

  3. Set external sharing to any of these options:

    - “Only people in your organization” (No external sharing allowed)

    - "Existing guests" (Only guests already in your organization's directory)

    - “New and existing guests” (Guests must sign in or provide a verification code.).


3. Disabled Audit Logging


Why it matters: Without logs, you can’t investigate suspicious activity.


How to fix it:

  1. Go to Microsoft Purview compliance portal.

  2. Navigate to Audit > Audit log search.

  3. Click Start recording user and admin activity.


4. Unmonitored Mail Forwarding Rules


Why it matters: Attackers use forwarding to exfiltrate data silently.


How to fix it:

  1. In the Microsoft Defender portal at https://security.microsoft.com

  2. Go to Email & Collaboration > Policies & Rules > Threat policies > Anti-spam in the Policies section.

  3. Select Anti-spam outbound policy (Default)

  4. Scroll to the Automatic forwarding setting.

  5. Set it to: Off (Forwarding is disabled)

  6. Click Save to apply the changes.


5. Inactive Users with Access


Why it matters: Former employees may still have access to sensitive data.


How to fix it:

  1. Review user activity in Microsoft Entra ID.

  2. Disable or delete inactive accounts.

  3. Reset their password.


6. Weak Password Policies


Why it matters: Simple passwords are easily guessed or brute-forced.


How to fix it:

  1. Go to Microsoft Entra ID > Authentication methods > Password protection.

  2. Enable custom banned password list.

  3. Enforce strong password length and complexity.


7. Lack of Conditional Access Policies


Why it matters: Not all users should access data from all locations or devices.


How to fix it:

  1. Go to Microsoft Entra admin center > Conditional Access.

  2. Create policies to block access from untrusted locations or unmanaged devices.

  3. Use sign-in risk detection to trigger MFA or block access.


8. No Data Loss Prevention (DLP) Policies


Why it matters: Sensitive data can leak via email, Teams, or cloud apps.


How to fix it:

  1. Go to Microsoft Purview > Data Loss Prevention.

  2. Create DLP policies for Exchange, SharePoint, OneDrive, and Teams.

  3. Define sensitive info types (e.g., credit card, SSN).

  4. Set actions like block, encrypt, or audit.


9. Unprotected Mobile Devices


Why it matters: BYOD introduces unmanaged risks.


How to fix it:


  1. Use Microsoft Intune > App Protection Policies.

  2. Require PIN, encryption, and wipe on sign-out.

  3. Block access from jailbroken or rooted devices.


10. Ignoring Microsoft Secure Score


Why it matters: Secure Score offers actionable insights to improve security.


How to fix it:

  1. Go to Microsoft 365 Defender portal > Secure Score.

  2. Review your current score and recommendations.

  3. Implement high-impact actions like MFA, DLP, and conditional access.

  4. Track progress over time.


Fixing these Microsoft 365 Security Misconfigurations is essential for protecting your organization’s data, reputation, and compliance. This complete setup guide gives you the tools to act today.


Need help auditing your Microsoft 365 environment or implementing these fixes? Contact us for a free security assessment.



 
 
 

Get the Latest News to Your Inbox

bottom of page