M365 Tips to secure your tenant

 




🔐 5 Quick CIS Security Wins to Strengthen Your Microsoft 365 Tenant Today

 

As IT professionals, we all want a secure tenant, but between tickets, deployments, and patching, configuring new settings in Intune, Entra, Defender, etc. security hardening often gets pushed to ‘will do later.’

The problem?
Attackers will never wait us!

I found a couple of settings, some of them so simple, but we miss them because we are always busy. I was digging in Defender and M365 Admin Center:

1.      📅 CIS Benchmark L2 for M365 recommended to disable calendar share with external.

 

One of the main reasons attackers need to know about your organization before they attack it is that if we allow our users to publicly share their calendars, it can help attackers learn more about the organization and its users. They can then use this information to exploit situations like when employees are out of the office, traveling, etc. 

2.      👉Teams & Groups, CIS Benchmark L2 for M365 recommends changing your default Teams group from Public to Private. Teams & Groups.

When your Teams groups are public, it means anything shared with the group members can be accessed by anyone within the organization (not from outside) without needing permission from the owner. The same applies to SharePoint, such as adding themselves to public groups in Azure, requesting access through group applications, accessing SharePoint URLs, etc. Once you change it to ‘Private’, no one can access without permission from the group owners.

3.      🔐Customer Lockbox: CIS Benchmark L2 for M365 recommends checking the box; this helps M365 Admins secure their tenant, so Microsoft Engineers need to grant access to their tenant before providing support or troubleshooting.

 

4.      🛡 CIS Benchmark L2 for M365 Security, under ‘Safe links’ recommended to

uncheck "Do not rewrite URLs, do checks via SafeLinks API only" because if you keep it checked, this will scan only URLs received through SafeLinks API (Microsoft’s secure link scanning service), and will not process URLs outside this service. This approach prevents URLs from being altered or rewritten, providing safer click-through experiences for users.

Uncheck “Let users click through to the original URL” to ensure all links are scanned at the time of click and rewritten if safe, preventing bypass of protection.

 

5.      🛡CIS Benchmark L2 for M365 Security, under ‘Notify an admin about undelivered message from internal senders.’

The primary security reason for this is critical, it allows the admin to detect and address malware-infected messages before they reach recipients.

It also gives the admin a clear audit trail and alerts security teams so they can respond quickly.

I hope these tips help to secure your tenants.

 

 

Comments

Popular posts from this blog

New LAPS for Windows 11 24H2

Why Your Devices Are Skipping Updates in SCCM and Intune – And How to Fix It Fast

How to block TikTok or other social media