Mako Logics

Resources / M365 Security Baseline

Microsoft 365 security baseline for Houston small business.

The configuration we deploy on every Houston managed client’s M365 tenant. Focused on what actually reduces risk for a 10–300 employee business, not the 400-item enterprise checklist.

Published April 21, 2026. Updated as Microsoft releases new controls.

This baseline assumes Business Standard, Business Premium, or Enterprise E3/E5 licensing. Some controls require Business Premium or higher. Where a control is license-gated we call it out.

Identity & access

  • Security defaults disabled, Conditional Access enforced instead (finer-grained)
  • MFA required for every user — no exceptions, including service accounts via certificate or app password where possible
  • Block legacy authentication (POP, IMAP, SMTP basic auth, ActiveSync basic) at the tenant level
  • Block sign-in from countries where you don't operate (country-based Conditional Access)
  • Require compliant device or hybrid-joined device for sensitive roles (Business Premium+)
  • Self-service password reset enabled
  • Privileged Identity Management (PIM) for admin roles — just-in-time elevation (E5 / EMS E5)

Email protection

  • DMARC enforcement on your sending domain (not just p=none)
  • SPF and DKIM aligned and published for all sending sources
  • Anti-phishing policy with impersonation protection on VIP accounts
  • Safe Attachments and Safe Links enabled (Defender for Office 365 — Business Premium+)
  • External-sender banner on all inbound email
  • Block auto-forwarding to external addresses (a classic post-compromise attacker move)
  • Quarantine review rhythm — weekly at minimum

Device management (Intune)

  • All company devices enrolled in Intune
  • BitLocker enforced on all Windows devices, FileVault on all Macs
  • OS update compliance policy: no device more than 7 days behind current patch
  • Application control — only approved apps can install on company devices (Business Premium+)
  • Remote-wipe capability tested annually

Data protection (Purview)

  • Sensitivity labels configured for Internal, Confidential, and PII/PHI categories
  • DLP policies blocking SSN, credit-card, and (for healthcare) PHI from leaving the tenant
  • Retention policies aligned to your legal and regulatory requirements
  • Sharing restrictions on SharePoint / OneDrive — no anonymous links for confidential labels
  • Audit log retention set to 1 year minimum (90 days default; longer requires E5 or compliance add-on)

SharePoint & OneDrive

  • Site-level access reviews quarterly
  • External sharing off by default, enabled per-site where business requires it
  • Link defaults: 'Specific people' not 'Anyone with the link'
  • SharePoint version history retained 90+ days
  • OneDrive KFM (Known Folder Move) enabled so Desktop/Documents/Pictures back up automatically

Teams

  • External federation limited to partner tenants only, not open
  • Meeting lobby enforced for external participants
  • Recording retention set; recordings land in a reviewable location
  • App permission policy limits what third-party Teams apps users can add

Audit & response

  • Unified audit log enabled and reviewed (at least via an alerting tool)
  • Risky-sign-in alerts routed to your MSP or security team
  • Impossible-travel detection enabled
  • Mailbox audit on all accounts
  • Documented incident-response runbook for a compromised M365 account

What this baseline does NOT cover

  • CMMC / HIPAA / SOC 2-specific controls beyond the M365 configuration
  • Backup — M365's retention is not backup; you need a third-party M365 backup (Acronis, CrashPlan, Datto, etc.)
  • On-premises Active Directory hardening (if you still run AD)
  • Identity governance at enterprise scale — PIM access reviews, access packages