M365 Tips to secure your tenant
🔐 5 Quick CIS Security
Wins to Strengthen Your Microsoft 365 Tenant Today
As IT professionals, we all want a secure tenant, but
between tickets, deployments, and patching, configuring new settings in Intune,
Entra, Defender, etc. security hardening often gets pushed to ‘will do later.’
The problem?
⚠️Attackers will never wait us!
I found a couple of settings, some of them so simple, but we
miss them because we are always busy. I was digging in Defender and M365 Admin Center:
1.
📅 CIS Benchmark L2 for M365 recommended to
disable calendar share with external.
One of the main reasons attackers need to
know about your organization before they attack it is that if we allow our
users to publicly share their calendars, it can help attackers learn more about
the organization and its users. They can then use this information to exploit
situations like when employees are out of the office, traveling, etc.
2.
👉Teams
& Groups, CIS Benchmark L2 for M365 recommends changing your default Teams
group from Public to Private. Teams & Groups.
When your Teams groups are public, it means
anything shared with the group members can be accessed by anyone within the
organization (not from outside) without needing permission from the owner. The
same applies to SharePoint, such as adding themselves to public groups in
Azure, requesting access through group applications, accessing SharePoint URLs,
etc. Once you change it to ‘Private’, no one can access without permission from
the group owners.
3.
🔐Customer
Lockbox: CIS Benchmark L2 for M365 recommends checking the box; this helps M365
Admins secure their tenant, so Microsoft Engineers need to grant access to
their tenant before providing support or troubleshooting.
4.
🛡️ CIS Benchmark L2 for M365 Security,
under ‘Safe links’ recommended to
uncheck "Do not rewrite
URLs, do checks via SafeLinks API only" because if you keep it checked, this
will scan only URLs received through SafeLinks API (Microsoft’s secure link
scanning service), and will not process URLs outside this service. This
approach prevents URLs from being altered or rewritten, providing safer
click-through experiences for users.
Uncheck “Let users click through to the original
URL” to ensure all links are scanned at the time of click and rewritten if
safe, preventing bypass of protection.
5.
🛡️CIS Benchmark L2 for M365 Security,
under ‘Notify an admin about undelivered message from internal senders.’
The primary security reason for
this is critical, it allows the admin to detect and address malware-infected
messages before they reach recipients.
It also gives the admin a clear audit trail and
alerts security teams so they can respond quickly.
I hope these tips help to secure your tenants.

Comments