Microsoft 365 Security Checklist for Small Businesses (2026)
A technical, actionable checklist for Canadian small businesses running Microsoft 365 Business Standard or Business Premium — built by the managed IT team at CtrlShift IT Services.
Why Most Microsoft 365 Tenants Are Misconfigured
Microsoft 365 ships in a permissive default state. Legacy authentication protocols are often still active. Multi-factor authentication is available but not enforced. SharePoint external sharing may be open to anyone with a link. Admin accounts frequently share credentials with daily work accounts. These defaults simplify initial setup — but in a live business tenant they represent real, exploitable gaps.
Small businesses with 5–50 employees are a primary target precisely because they carry valuable data and are easier to exploit than enterprises. A misconfigured Microsoft 365 tenant is the most common entry point we see in SMB breach cases.
This checklist is the anchor guide in our Microsoft 365 Security hub. Use it as the baseline, then branch into the live phishing protection guide and the upcoming deep dives linked throughout the page.
What Secure Score Should a Small Business Target?
Microsoft Secure Score is a built-in dashboard in the Microsoft 365 Defender portal that measures how well your tenant is configured. It gives you a number — and more usefully — a prioritized list of exactly what to fix next. Access it at security.microsoft.com → Secure Score.
Review your Secure Score monthly. Use the Improvement Actions tab to see a prioritized list — each action shows the point value, implementation difficulty, and exact portal location.
Your Defense Stack — Four Protection Layers
Every control in this checklist belongs to one of four protection layers. No single layer stops everything — all four working together is what creates a defensible posture.
The Microsoft 365 Security Checklist (19 Controls)
Check items as you complete them — your progress is saved in your browser.
Multi-Factor Authentication (MFA)
Enforcing MFA across every Microsoft 365 account is the single highest-impact control available to a small business. Passwords alone are routinely stolen through phishing, credential stuffing, and info-stealer malware. MFA blocks the overwhelming majority of automated account takeover attempts — and its absence is the most common reason cyber insurance claims are denied after a breach.
Enforce MFA on all user accounts
Prefer authenticator apps over SMS codes
Audit service accounts and shared mailboxes for MFA gaps
Disable Legacy Authentication
Legacy authentication protocols — IMAP, POP3, basic SMTP auth, and older Exchange ActiveSync — cannot enforce MFA. A stolen password alone grants mailbox access through these protocols regardless of what MFA policies are set elsewhere in the tenant.
Block legacy authentication tenant-wide
Audit for active legacy connections before disabling
Conditional Access Policies
Conditional Access is the policy engine that controls how, from where, and from what devices your team can sign into Microsoft 365. A small set of well-configured policies delivers significant protection beyond Security Defaults alone.
Require MFA for all users
Require compliant devices for admin actions
Block sign-ins from countries you don't operate in
Admin Role Protection
Global administrators have unrestricted access to your entire Microsoft 365 environment — including the ability to reset any password, delete data, remove audit logs, and disable security policies. Compromise of a single global admin account is effectively a complete tenant takeover.
Create dedicated admin accounts for admin tasks only
Protect global admin accounts with hardware security keys
Replace Global Admin with scoped roles where possible
Anti-Phishing Policies
Phishing is the leading cause of Microsoft 365 account compromise in small businesses. Defender anti-phishing capabilities go well beyond basic spam filtering — but require configuration to be effective. A default tenant has minimal protection. A configured tenant has impersonation detection, mailbox intelligence, and first-contact safety tips active.
Configure anti-phishing policies in Microsoft Defender
Safe Links and Safe Attachments
Safe Links checks URLs at the moment a user clicks — not just at delivery — catching links that turned malicious after reaching the inbox. Safe Attachments detonates suspicious files in an isolated sandbox before delivering them, blocking malware that signature-based scanning misses.
Enable Safe Links for email and Office 365 apps
Enable Safe Attachments for email, SharePoint, OneDrive, and Teams
DKIM and DMARC Configuration
SPF, DKIM, and DMARC are DNS-level email authentication standards. Together they prove email from your domain is genuine — and instruct receiving servers what to do with messages that fail the check. Without all three, anyone can send convincing spoofed email appearing to come from your domain.
Configure DKIM for your domain
Publish and enforce a DMARC policy
Mailbox Auditing
Mailbox auditing records a log of every action in each user's mailbox — who accessed it, what was read, what was deleted, and whether forwarding rules were added. Without it, a post-breach investigation has nothing to work with.
Verify mailbox auditing is enabled tenant-wide
Get-EXOMailbox -ResultSize Unlimited | Select-Object UserPrincipalName, AuditEnabledReview all mailboxes for unauthorized forwarding rules
Audit Logging and Alert Policies
Unified audit logging captures activity across Exchange, SharePoint, Teams, and Entra ID. Alert policies trigger notifications on high-risk events. Together they are the foundation of any incident detection capability — and increasingly expected by cyber insurers as evidence of monitoring.
Enable unified audit logging
Configure alert policies for high-risk events
Staff Phishing Awareness Training
Technical controls reduce the attack surface — but a convincing phishing email still reaches inboxes. Staff training is the last line of defence. The goal is not to eliminate all clicks; it is to make suspicious emails reportable, normalize asking for help, and ensure staff know what to do in the first 15 minutes after clicking something suspicious.
- Run short monthly phishing simulations (Microsoft Attack Simulator, included in Business Premium) — frequency beats length
- Install the Microsoft "Report Message" Outlook add-in — reporting should be one click
- Make it explicitly safe to report a click without fear of blame — reported incidents are easier to contain than hidden ones
- Train staff to recognize: invoice fraud, Microsoft 365 login spoofs, CEO impersonation
- Document what to do immediately after clicking: who to call, whether to close the browser, whether to shut down the device
Endpoint Security for Business Devices
Endpoints — laptops, desktops, phones, tablets, including personal BYOD devices — are the second primary attack surface alongside email. Built-in Windows Defender provides a baseline but is not sufficient for businesses with remote workers, BYOD devices, or active cyber insurance obligations. Microsoft Defender for Business (included in Business Premium) provides EDR-level protection managed through Intune.
Deploy endpoint detection and response (EDR) on all devices
Enforce disk encryption and automatic OS updates via Intune
Pair this guide with our managed security and firewall service for hands-on EDR deployment and tenant hardening.
Microsoft 365 Backup — Retention Is Not a Backup
The Recycle Bin, OneDrive version history, and SharePoint retention policies are convenience recovery features — not backups. They have short windows, can be wiped by a compromised admin account, and do not protect against ransomware encryption.
Deploy a third-party Microsoft 365 backup solution
Test backup restores quarterly and document results
Ransomware Protection and Incident Response
Ransomware attacks almost always follow the same path: a phishing email compromises a credential, the attacker moves laterally, then deploys encryption. Every stage of that chain is breakable — MFA stops credential-only attacks, endpoint protection detects lateral movement, Safe Attachments blocks malicious payloads, and backup provides the recovery path.
- Enforce least-privilege on both user and admin accounts — limit the blast radius of any compromised identity
- Apply the 3-2-1 rule: three copies of data, two media types, one copy outside the production tenant
- Test restores quarterly and document results — an untested backup is not a backup
- Write down who makes decisions in the first 60 minutes of an incident, before you need it
- Confirm your cyber insurance policy's position on ransom payment in advance
Common Microsoft 365 Security Gaps We Find in Small Business Tenants
These are the issues we encounter most frequently when auditing a new client's tenant. None require expensive tools to fix — they require configuration and attention.
More From the Security Hub
Frequently Asked Questions
What is Microsoft Secure Score and what should a small business target?
Do I need Microsoft 365 Business Premium for Conditional Access?
Is Microsoft 365 secure out of the box?
What does DKIM protect against and how is it different from SPF?
What does cyber insurance require from a small business?
Does Microsoft back up my emails and files in 365?
What is legacy authentication and why is it dangerous?
Do we really need MFA if we use strong passwords?
What is the difference between antivirus and endpoint detection and response (EDR)?
How much should a small business spend on cybersecurity?
What should we do immediately if we suspect a Microsoft 365 breach?
How often should we run phishing awareness training for staff?
Want Us to Review Your Microsoft 365 Tenant Security?
We offer a structured Microsoft 365 tenant security review for small businesses. It is not a sales call — it is a technical audit of your tenant configuration against the controls in this checklist, delivered as a written report you can act on with or without our ongoing involvement.
Next Steps
Start with the CRITICAL-tagged controls at the top of the checklist — MFA enforcement, legacy authentication blocking, admin account separation, and backup. These deliver the highest impact and are most frequently checked by cyber insurers. Then work through HIGH-rated email security and endpoint controls. Schedule a quarterly Secure Score review to catch drift.
Security is a posture, not a one-time project. The practical goal for a 5–50 person business is a documented, maintainable Microsoft 365 security baseline — not perfection.
In this guide
- Microsoft 365 Security hub overview
- Phishing & Email Threat Defense
- Rolling Out MFA Without Breaking Things(Microsoft 365 Security hub, in progress)
- Microsoft 365 Backup: What You Actually Need(Microsoft 365 Security hub, in progress)