Microsoft 365 β Exchange Online, SharePoint, Teams, OneDrive β sits on top of Entra ID and is the email + collaboration layer for most enterprises. It is also the most common entry point for attackers in 2026: phishing β credential or session theft β mailbox exfil β BEC fraud or lateral movement to Azure. This module covers the M365 security posture, Exchange-specific controls, and the Microsoft Defender stack.
The M365 attack surface
- Authentication: Entra ID β covered in M1; the foundation
- Email: Exchange Online β phishing in/out; mailbox exfil; BEC; auto-forward abuse
- File sharing: SharePoint, OneDrive β overshared documents, external sharing, link sprawl
- Collaboration: Teams β channels, files, external guest access
- Apps: Power Platform (Power Apps, Power Automate) β citizen-developed apps with broad data access
- Endpoints: managed via Intune; Defender for Endpoint integration
Exchange Online hardening
Anti-phishing
- Microsoft Defender for Office 365 Plan 2 if budget allows; Plan 1 minimum
- Safe Links β rewrite URLs in mail; check at click time
- Safe Attachments β sandbox detonation before delivery
- Anti-phishing policies with impersonation protection (executive lookalikes, domain lookalikes)
- Mailbox auditing enabled for all mailboxes
Auth + transport
- SPF, DKIM, DMARC at p=reject for sender domain (covered in DPDP/Email security)
- Disable legacy authentication (POP, IMAP, SMTP basic) via Authentication Policies
- Outbound spam policy with high-risk send blocking
- Safe Senders / Safe Domains lists reviewed quarterly
BEC defenses
- External sender warnings on emails (banner)
- Conditional Access blocking sign-ins from unsupported countries
- Sign-in risk policies require MFA on suspicious signins
- Auto-forward to external addresses blocked or alerted
- Mailbox rule changes monitored β attackers create rules to hide their tracks
SharePoint & OneDrive
- External sharing settings per-tenant: most-restrictive default; opt-in to broader where business need
- Sensitivity labels with auto-application via Microsoft Purview
- Default link type β Specific People, not Anyone with the link
- Anonymous link expiration β 30 days max
- Block download/print for sensitivity-labeled docs
- Conditional Access for SharePoint β require compliant device for unmanaged scenarios
Teams security
- External access control β federation with which tenants?
- Guest access β restrict guest permissions per business need
- Meeting policies β anonymous join controls, lobby behavior
- App permission policies β what apps users can install in Teams
- Recording & transcription β sensitivity considerations
- Information barriers β segments that cannot communicate (compliance use case)
Power Platform β the shadow IT vector
Power Apps and Power Automate let business users build apps and workflows without IT. They can connect to any data the user has access to β and share with others. Risks:
- App reads sensitive data; shared with broad audience
- Flow auto-forwards data externally
- Connector credentials stored in user contexts; survive role changes
- DLP not native; configure DLP policies explicitly
Controls:
Continue reading with Basic tier (βΉ499/month)
You've read 43% of this module. Unlock the remaining deep-dive, quiz, and every other Intermediate module.