Academy

Module 3 Β· Microsoft 365 Security πŸ”’

Manish Garg
Manish Garg Associate CISSP Β· RingSafe
April 22, 2026
4 min read

Microsoft 365 β€” Exchange Online, SharePoint, Teams, OneDrive β€” sits on top of Entra ID and is the email + collaboration layer for most enterprises. It is also the most common entry point for attackers in 2026: phishing β†’ credential or session theft β†’ mailbox exfil β†’ BEC fraud or lateral movement to Azure. This module covers the M365 security posture, Exchange-specific controls, and the Microsoft Defender stack.

The M365 attack surface

  • Authentication: Entra ID β€” covered in M1; the foundation
  • Email: Exchange Online β€” phishing in/out; mailbox exfil; BEC; auto-forward abuse
  • File sharing: SharePoint, OneDrive β€” overshared documents, external sharing, link sprawl
  • Collaboration: Teams β€” channels, files, external guest access
  • Apps: Power Platform (Power Apps, Power Automate) β€” citizen-developed apps with broad data access
  • Endpoints: managed via Intune; Defender for Endpoint integration

Exchange Online hardening

Anti-phishing

  • Microsoft Defender for Office 365 Plan 2 if budget allows; Plan 1 minimum
  • Safe Links β€” rewrite URLs in mail; check at click time
  • Safe Attachments β€” sandbox detonation before delivery
  • Anti-phishing policies with impersonation protection (executive lookalikes, domain lookalikes)
  • Mailbox auditing enabled for all mailboxes

Auth + transport

  • SPF, DKIM, DMARC at p=reject for sender domain (covered in DPDP/Email security)
  • Disable legacy authentication (POP, IMAP, SMTP basic) via Authentication Policies
  • Outbound spam policy with high-risk send blocking
  • Safe Senders / Safe Domains lists reviewed quarterly

BEC defenses

  • External sender warnings on emails (banner)
  • Conditional Access blocking sign-ins from unsupported countries
  • Sign-in risk policies require MFA on suspicious signins
  • Auto-forward to external addresses blocked or alerted
  • Mailbox rule changes monitored β€” attackers create rules to hide their tracks

SharePoint & OneDrive

  • External sharing settings per-tenant: most-restrictive default; opt-in to broader where business need
  • Sensitivity labels with auto-application via Microsoft Purview
  • Default link type β€” Specific People, not Anyone with the link
  • Anonymous link expiration β€” 30 days max
  • Block download/print for sensitivity-labeled docs
  • Conditional Access for SharePoint β€” require compliant device for unmanaged scenarios

Teams security

  • External access control β€” federation with which tenants?
  • Guest access β€” restrict guest permissions per business need
  • Meeting policies β€” anonymous join controls, lobby behavior
  • App permission policies β€” what apps users can install in Teams
  • Recording & transcription β€” sensitivity considerations
  • Information barriers β€” segments that cannot communicate (compliance use case)

Power Platform β€” the shadow IT vector

Power Apps and Power Automate let business users build apps and workflows without IT. They can connect to any data the user has access to β€” and share with others. Risks:

  • App reads sensitive data; shared with broad audience
  • Flow auto-forwards data externally
  • Connector credentials stored in user contexts; survive role changes
  • DLP not native; configure DLP policies explicitly

Controls:

πŸ” Intermediate Module Β· Basic Tier

Continue reading with Basic tier (β‚Ή499/month)

You've read 43% of this module. Unlock the remaining deep-dive, quiz, and every other Intermediate module.

99+ modulesAll levels up to this tier
20-question quizzesUnlimited retries with explanations
Completion certificatesShareable on LinkedIn
1 more section locked below