Microsoft certification badges banner
Headshot of Michael Korting

Blog

Microsoft 365 • Security • Compliance

A Practical Microsoft 365 Minimum Security Baseline
Built for the Real World

A deployable, opinionated baseline for securing Microsoft 365 tenants without overengineering.

Why “Out‑of‑the‑Box” Microsoft 365 Is Not Enough

Microsoft 365 ships with powerful security tooling — Defender, Intune, Conditional Access, Purview, Autopilot, and Entra ID — but very little of it is enabled correctly by default.

In real environments, I repeatedly see tenants that:

  • Rely on Security Defaults instead of Conditional Access
  • Have Defender licensed but not onboarded
  • Use Intune only for enrollment, not enforcement
  • Lack email authentication (DKIM, SPF, DMARC)
  • Still allow legacy authentication paths
  • Have no baseline for endpoint or identity hardening

To address this gap, I developed a minimum Microsoft 365 tenant baseline — a repeatable, documented configuration that establishes a secure, supportable foundation without overengineering.

This is not theoretical guidance.
This is a deployment‑standard baseline refined across real tenants.

What This Baseline Is (and Is Not)

✅ What It Is

  • A minimum viable secure configuration
  • Aligned to Microsoft Secure Score
  • Designed for Business Premium through E5
  • Compatible with cloud‑only and hybrid environments
  • Built for scalability, auditability, and future uplift

❌ What It Is Not

  • A maximum‑security or Zero Trust “end state”
  • A vendor‑specific SOC replacement
  • A compliance framework by itself (though it supports CMMC, HIPAA, ISO)

Baseline Architecture — What Gets Configured

This baseline deliberately touches every major Microsoft 365 security control plane, in the correct order.

1. Identity Protection: Conditional Access & MFA

Everything starts with identity. This baseline replaces Security Defaults with explicit Conditional Access policies:

  • MFA enforcement for admins, Azure management, and users
  • Blocking legacy authentication
  • Risk‑based policies (Entra ID P2 where available)
  • Optional phish‑resistant MFA for admins
  • Documented exclusions for Intune, sync accounts, and legacy systems

Why this matters: Nearly every tenant compromise starts with identity.

2. Endpoint Management: Intune as a Control Plane

Intune is configured as an enforcement platform, not just enrollment.

  • Validated MDM authority and enrollment scope
  • Autopatch or controlled update rings
  • Device filters, scope tags, and cleanup rules
  • Corporate vs personal device separation

3. Secure Device Provisioning: Windows Autopilot

Autopilot enables security before first sign‑in, not after problems occur.

  • Entra ID and Hybrid join support
  • Dynamic device groups
  • Self‑deploying and user‑driven scenarios
  • Naming standards and delegation

4. Endpoint Detection & Response: Defender

Licensing Defender does nothing. Onboarding does.

  • Defender portal activation
  • Advanced features and auto‑remediation
  • ASR rules (audit‑first)
  • Device grouping and alert routing

5. Email Security & Authentication

  • Defender for Office 365 Standard baseline
  • Safe Attachments & Safe Links
  • Impersonation and anti‑phishing protection
  • DKIM, SPF, DMARC enforcement

6. Data Protection: Encryption & IRM

  • Message Encryption activation
  • Azure Information Protection verification
  • IRM enablement and testing

7. Passwordless Authentication: Windows Hello for Business

  • TPM‑backed credentials
  • Cloud Kerberos Trust (hybrid)
  • Conditional Access alignment

8. Copilot Readiness

A secure tenant must assume Copilot adoption. This baseline ensures access is intentional and governed — not accidental.

Final Thoughts

A secure Microsoft 365 tenant is not created by buying licenses. It is created by intentional configuration.

If your tenant lacks Conditional Access enforcement, Defender onboarding, Intune enforcement, email authentication, or passwordless readiness — this baseline should be your starting point.