Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Projects
  3. Microsoft 365 Security Baseline Implementation
Microsoft 365 Security Baseline Implementation
PROJECTIntermediate

Microsoft 365 Security Baseline Implementation

Implement a comprehensive security baseline for Microsoft 365 tenants covering identity protection, email security, endpoint management, data governance,...

Dylan H.

Security Engineer

February 5, 2026
9 min read
8-12 hours

Tools & Technologies

Microsoft 365 Admin CenterEntra Admin CenterMicrosoft PurviewPowerShell

Introduction

A properly secured Microsoft 365 tenant is the foundation of modern enterprise security. This project walks through implementing a comprehensive security baseline aligned with CIS Benchmarks and Microsoft's own security recommendations.

What You'll Build

  • Identity protection with conditional access and PIM
  • Email security hardening (anti-phishing, DMARC, safe links)
  • Endpoint management with Intune compliance policies
  • Data governance with sensitivity labels and DLP
  • Audit logging and security monitoring
  • Compliance dashboard with automated scoring

Who This Is For

  • IT administrators responsible for M365 security
  • MSP engineers standardizing client tenant configurations
  • Security teams implementing compliance frameworks
  • Organizations preparing for SOC 2, HIPAA, or PCI DSS audits

Time to complete: 8-12 hours (phased implementation recommended)


Prerequisites

License Requirements

FeatureMinimum License
Conditional AccessM365 E3 / Entra ID P1
PIMM365 E5 / Entra ID P2
Defender for Office 365M365 E3 (P1) / E5 (P2)
IntuneM365 E3+
Sensitivity LabelsM365 E3+
Advanced AuditM365 E5
Auto-labelingM365 E5

Required Roles

  • Global Administrator (initial setup only)
  • Security Administrator
  • Exchange Administrator
  • Compliance Administrator
  • Intune Administrator

Project Phases

Phase 1: Identity Security          [Day 1]     ████████████░░░ 40%
Phase 2: Email Security             [Day 1-2]   ██████████████░ 60%
Phase 3: Endpoint Management        [Day 2-3]   ████████████████ 75%
Phase 4: Data Governance            [Day 3-4]   ████████████████ 90%
Phase 5: Monitoring & Compliance    [Day 4-5]   ████████████████ 100%

Phase 1: Identity Security

1.1 Emergency Access Accounts

Create two break-glass accounts before configuring any policies:

SettingAccount 1Account 2
UPNemergency-admin-01@tenant.onmicrosoft.comemergency-admin-02@tenant.onmicrosoft.com
RoleGlobal AdministratorGlobal Administrator
MFADisabledDisabled
Password30+ characters, stored in physical safeDifferent 30+ chars, different safe
MonitoringSign-in alerts enabledSign-in alerts enabled
Excluded fromALL conditional access policiesALL conditional access policies

1.2 Conditional Access Policies

Deploy in this order (each policy should be tested in Report-only mode for 24-48 hours before enforcing):

Policy 1 — Require MFA for All Users:

  • Target: All users (exclude break-glass accounts)
  • Cloud apps: All cloud apps
  • Grant: Require authentication strength — Phishing-resistant MFA
  • Session: Sign-in frequency — 12 hours

Policy 2 — Block Legacy Authentication:

  • Target: All users
  • Cloud apps: All cloud apps
  • Conditions: Client apps — Exchange ActiveSync, Other clients
  • Grant: Block

Policy 3 — Require Compliant or Hybrid Joined Device:

  • Target: All users
  • Cloud apps: Office 365
  • Grant: Require device to be marked as compliant OR Require Hybrid Azure AD joined device

Policy 4 — Restrict Admin Portal Access:

  • Target: All users (exclude Global Admins)
  • Cloud apps: Microsoft Admin Portals
  • Grant: Require MFA + compliant device

Policy 5 — Block High-Risk Sign-ins:

  • Target: All users
  • Conditions: Sign-in risk — High
  • Grant: Block

Policy 6 — Require Password Change for High-Risk Users:

  • Target: All users
  • Conditions: User risk — High
  • Grant: Require MFA + require password change

1.3 Privileged Identity Management (PIM)

Configure just-in-time admin access:

RoleMax DurationRequire ApprovalRequire MFA
Global Administrator2 hoursYesYes
Exchange Administrator4 hoursNoYes
Security Administrator8 hoursNoYes
User Administrator8 hoursNoYes
SharePoint Administrator4 hoursNoYes

Phase 2: Email Security

2.1 Domain Authentication

RecordValue
SPFv=spf1 include:spf.protection.outlook.com -all
DKIMEnable in Defender portal for each domain
DMARCStart p=none, progress to p=reject over 4 weeks

2.2 Anti-Phishing

Configure the Strict preset security policy in Microsoft 365 Defender, which sets:

  • Mailbox intelligence protection: Quarantine
  • Spoof intelligence: Enabled
  • First contact safety tips: Enabled
  • Impersonation protection for executives and key partners

2.3 Transport Rules

RuleAction
External email bannerPrepend warning to all external emails
Block auto-forwardingReject external auto-forwards
Block dangerous attachmentsReject .exe, .bat, .ps1, .vbs, .js, etc.
Encrypt sensitive contentApply encryption to emails matching DLP patterns

Phase 3: Endpoint Management (Intune)

3.1 Device Compliance Policies

Windows 10/11 Compliance:

SettingValue
BitLocker requiredYes
Firewall requiredYes
Antivirus requiredYes
Minimum OS versionWindows 10 22H2 / Windows 11 23H2
Password requiredYes
Minimum password length8
Require encryptionYes

macOS Compliance:

SettingValue
FileVault requiredYes
Firewall requiredYes
System integrity protectionYes
Minimum OS versionmacOS 14.0

3.2 Device Configuration Profiles

Windows Security Baseline:

CategoryKey Settings
BitLockerFull disk encryption, TPM required
Windows FirewallEnabled on all profiles
Defender AntivirusReal-time protection, cloud protection
ASR RulesBlock Office macros, credential theft, script abuse
Windows UpdateAuto-install quality updates within 3 days

3.3 Windows Autopilot

Configure for zero-touch deployment:

  1. Register device hardware IDs
  2. Create Autopilot deployment profile
  3. Assign to device group
  4. User-driven or self-deploying mode

Phase 4: Data Governance

4.1 Sensitivity Labels

LabelEncryptionMarkingAuto-apply
PublicNone"PUBLIC" footerNo
InternalNone"INTERNAL" footerNo
ConfidentialYes — org only"CONFIDENTIAL" header/footer + watermarkDLP match
Highly ConfidentialYes — specific users"HIGHLY CONFIDENTIAL" header/footer + watermarkManual only

4.2 Data Loss Prevention Policies

PolicyScopeSensitive TypesAction
Financial DataExchange, SPO, TeamsCredit cards, bank accountsBlock external sharing
PII ProtectionExchange, SPO, TeamsSSN, passport, driver's licenseBlock + notify compliance
Healthcare (HIPAA)Exchange, SPOMedical records, health dataBlock + encrypt
Source CodeSPO, OneDriveCustom (code patterns)Warn + log

4.3 Retention Policies

Content TypeRetainThen
Email7 yearsDelete
Teams chats3 yearsDelete
SharePoint documents7 yearsDelete
OneDrive files7 yearsDelete

Phase 5: Monitoring and Compliance

5.1 Audit Configuration

  • Enable Unified Audit Log
  • Enable Mailbox Auditing (all mailboxes, 365-day retention)
  • Enable Advanced Audit (E5) for critical accounts
  • Configure audit log search access (Security team only)

5.2 Alert Policies

AlertSeverityNotification
Unusual external file sharingMediumSecurity team
Mass file deletionHighSecurity team + admin
New inbox forwarding ruleMediumSecurity team
Admin role assignmentHighSecurity team + admin
Malware campaign detectedHighSecurity team + admin
DLP policy matchMediumCompliance team
eDiscovery searchHighCompliance team + legal

5.3 Microsoft Secure Score

Target these quick wins first:

ActionPointsEffort
Enable MFA for all admins+10Low
Block legacy authentication+8Low
Enable self-service password reset+6Low
Enable Safe Attachments+5Medium
Enable DMARC+5Medium
Designate more than one Global Admin+4Low
Do not expire passwords+4Low

Implementation Checklist

Identity

  • Break-glass accounts created and documented
  • MFA enforced for all users (phishing-resistant for admins)
  • Legacy authentication blocked
  • Conditional access policies deployed and enforced
  • PIM configured for privileged roles
  • Self-service password reset enabled

Email

  • SPF, DKIM, DMARC configured
  • Anti-phishing policies at strict preset
  • Safe Links and Safe Attachments enabled
  • External email banner active
  • Auto-forwarding blocked
  • Dangerous attachment types blocked

Endpoints

  • Compliance policies deployed for all platforms
  • BitLocker/FileVault required
  • Defender AV and ASR rules configured
  • Windows Update policies set
  • Autopilot configured for new devices

Data

  • Sensitivity labels published
  • DLP policies active
  • Retention policies configured
  • External sharing restricted

Monitoring

  • Unified audit log enabled
  • Alert policies configured
  • Secure Score reviewed and actions tracked
  • Quarterly compliance review scheduled

References

  • CIS Microsoft 365 Foundations Benchmark
  • Microsoft Security Documentation
  • Microsoft Secure Score
  • NIST SP 800-171 — Protecting CUI
#Microsoft 365#Security Baseline#Entra ID#Intune#Compliance#CIS Benchmark

Related Articles

Fortinet Centralized Management with FortiManager &

Deploy enterprise-grade centralized management for your Fortinet Security Fabric with FortiManager for configuration management and FortiAnalyzer for...

8 min read

Build a Collaborative IPS with CrowdSec

Deploy CrowdSec on a Linux server to get community-powered intrusion prevention — block brute-force attacks, credential stuffing, and vulnerability scanners using crowd-sourced threat intelligence and automatic firewall enforcement.

10 min read

Keycloak SSO: Self-Hosted Identity Provider for Your Homelab

Deploy Keycloak with Docker Compose and PostgreSQL to build a centralised single sign-on platform for your homelab services, with OIDC integration for...

11 min read
Back to all Projects