User Awareness
Short monthly training, one-click reporting, and a no-blame culture reduce how often suspicious emails become incidents.
A practical step-by-step guide for Canadian small businesses using Microsoft 365 Business Standard or Premium — written by the managed IT team at CtrlShift IT Services.
Most small business breaches do not start with a sophisticated zero-day exploit or a brute-force attack against your firewall. They start with one employee clicking one convincing email. Phishing is the leading cause of Microsoft 365 account takeovers — and a compromised M365 account is not just a lost inbox. It is access to SharePoint, OneDrive, Teams, and every integration your business has connected to that identity.
This guide stays focused on phishing prevention and response. For the wider Microsoft 365 posture — endpoint security, backup, and admin protection — branch into the Microsoft 365 Security Checklist.
Phishing defence is not one toggle in Microsoft 365. Small-business tenants hold up best when awareness, identity, email controls, and response discipline all reinforce each other.
Short monthly training, one-click reporting, and a no-blame culture reduce how often suspicious emails become incidents.
MFA, Conditional Access, and blocking legacy auth stop most credential-only phishing from turning into mailbox access.
Anti-phishing, Safe Links, Safe Attachments, SPF, DKIM, and DMARC reduce spoofing, malicious links, and attachment risk.
Fast reporting, session revocation, mailbox review, and a practiced response process shorten dwell time and limit fraud.
Fake login prompts steal passwords or session cookies and are still the most common entry point into Microsoft 365 tenants.
Attackers quietly monitor real mailboxes, learn approval flows, and redirect payments or payroll without deploying malware.
Weaponized invoices, resumes, and “shared documents” deliver malware or lure users into enabling risky macros.
Lookalike Microsoft sign-in pages use urgency, branding, and MFA prompts to make the phishing flow feel legitimate.
Use this lightweight checklist as a quick SMB baseline. Your progress is saved locally in this browser.
Use this example to show staff what a typical Microsoft 365 phishing email feels like. Click the numbered markers to reveal why each detail matters.
Hello,
We detected unusual sign-in activity on your Microsoft 365 account. To avoid deactivation, verify your mailbox and sign in again using the secure link below.
Review Mailbox ActivityThis secure review page expires in 15 minutes. Failure to act may result in email delivery disruption.
Technical controls can be bypassed when users act under social pressure. A convincing invoice email, a spoofed CEO message, or a fake Microsoft login page are designed to move faster than caution. Awareness training does not eliminate that risk — but it measurably reduces it, and it makes your other controls more effective by ensuring staff actually use the Report Message button.
Modern phishing attempts are highly targeted. Attackers research your business, reference real supplier names, and send from spoofed or compromised accounts your staff already trust. Training your team to slow down and verify before clicking — especially for unexpected requests involving payments, credentials, or urgency — addresses the most exploited vulnerability in any small business: human reflex.
Microsoft Defender includes a dedicated anti-phishing policy that catches impersonation attacks, spoofed senders, and domain lookalikes. Out of the box, basic protection is on — but the controls that catch targeted attacks against your specific business are off by default and require manual configuration.
Navigate to the Microsoft Defender portal → Email & Collaboration → Policies & Rules → Threat Policies → Anti-phishing. On the default policy, configure:
Business Standard includes basic anti-phishing. Business Premium (or the Defender for Office 365 Plan 1 add-on) unlocks the full impersonation and intelligence features. For admin accounts, apply the Strict preset security policy — it is the most conservative configuration Microsoft offers and should be the baseline for anyone with elevated privileges.
MFA is the single most effective control against credential-based phishing. A stolen password alone is not enough to access an account when MFA is enforced — which is why Microsoft's own data puts MFA at blocking over 99% of automated account takeover attempts.
The fastest path for most small businesses: enable Security Defaults in Microsoft Entra admin centre (formerly Azure AD). This enforces MFA registration for all users and blocks legacy authentication in one setting — no licence upgrade required.
Most phishing incidents only become breaches when a stolen password turns into a successful sign-in. Identity controls break that handoff. They do not stop every message from landing, but they stop most mailbox-takeover attempts from becoming business email compromise, data theft, or ransomware staging.
FIDO2 keys or passkeys stop modern token-theft kits far better than SMS codes. Use them first for admins, finance roles, and anyone approving wire changes.
Conditional Access checks context like device state, sign-in risk, and geography so a stolen password plus weak MFA is still not enough in the wrong conditions.
IMAP, POP, and older basic-auth flows bypass MFA completely. Blocking them removes the side door attackers test after they steal credentials.
Conditional Access moves beyond password-and-MFA by evaluating the context of each sign-in — location, device compliance, sign-in risk — and enforcing policies based on that context. It requires Microsoft 365 Business Premium or a Microsoft Entra ID P1 licence.
For a 5–50 employee business, four policies cover most of your exposure:
Start every policy in report-only mode for two weeks before enforcing. You will catch shared mailboxes, line-of-business apps, and device exceptions that would otherwise trigger a support call on day one.
Legacy protocols — IMAP, POP3, basic SMTP auth, Exchange ActiveSync with basic auth — cannot enforce MFA. No matter how strong your MFA rollout is, a single legacy-auth endpoint leaves a side door open that attackers specifically scan for. A stolen password is all they need.
Blocking legacy auth is one of the highest-impact, lowest-effort changes in this guide — and it is now flagged as a gap by most Canadian cyber insurance underwriters.
These three DNS records work together to tell receiving mail servers whether email claiming to come from your domain is actually from you. Without them, an attacker can send a phishing email that appears — to the recipient and their spam filter — to come from your own domain. This is how supplier fraud and CEO impersonation attacks are executed at scale.
Domain spoofing protection works best when all three records are treated as one system: SPF says who can send, DKIM proves the message was signed correctly, and DMARC tells receiving servers how strictly to enforce the result.
Lists the services allowed to send mail for your domain, including Microsoft 365 and any marketing or billing platforms you use.
Adds a cryptographic signature to outbound mail so receiving servers can verify the message really came from an approved sender.
Tells receiving systems whether to monitor, quarantine, or reject messages that fail SPF or DKIM alignment checks.
SPF is a DNS TXT record that lists the mail servers authorized to send on behalf of your domain. For Microsoft 365, add include:spf.protection.outlook.com to your SPF record. If you also send from a marketing platform or third-party system, include those as well.
DKIM adds a cryptographic signature to outbound email that receiving servers verify against a public key in your DNS. Enable it in the Defender portal under Email & Collaboration → Policies → Email Authentication Settings → DKIM. Microsoft generates the keys; you add two CNAME records to your DNS.
DMARC tells receiving servers what to do when email fails SPF or DKIM alignment. Start with p=none to monitor for two to four weeks, then move to p=quarantine, then p=reject. The monitoring phase shows you all legitimate mail streams sending on your behalf — marketing tools, CRMs, and invoicing platforms that need to be in SPF before you enforce.
Check your current status with a free MXToolbox DMARC lookup. Related guide (coming soon): How to Set Up DMARC for Your Business Domain.
Safe Links rewrites URLs in incoming email and Office documents and re-checks them at the moment of the click — not just at delivery time. This matters because attackers frequently use "time-of-click" attacks: send a clean URL that passes initial scanning, then replace the destination after delivery.
Enable Safe Links in Defender portal → Threat Policies → Safe Links. Key settings:
Safe Links requires Defender for Office 365 Plan 1 — included in Business Premium, or available as an add-on for Business Standard tenants.
Safe Attachments routes incoming email attachments through a detonation sandbox before delivering them — opening the file in a controlled environment to detect malicious behaviour that signature-based antivirus would miss. This catches zero-day malware, macro-based payloads, and weaponized Office documents.
Enable Safe Attachments in Defender portal → Threat Policies → Safe Attachments. Recommended settings:
Safe Attachments also requires Defender for Office 365 Plan 1 (Business Premium or add-on).
The practical goal is not zero clicks. It is shortening the time between a suspicious email and the response steps that limit mailbox abuse.
Fast response limits damage. The worst outcome is not the initial click — it is the 48 hours of undetected access that follow. Have this process written down before you need it, not after.
Understanding the attack methods helps you decide which controls are worth the investment. These are the bypass techniques we see most often in small business incidents:
These controls are configurable without external help — but configuration is only part of the picture. The gaps we most often find when auditing self-managed tenants are not missing settings; they are missing oversight. No one is watching the sign-in logs. Alerts are firing with no one reading them. A Conditional Access policy was set to report-only and never enforced.
Consider engaging a managed IT provider when:
A managed provider should be actively monitoring your tenant for anomalous sign-ins, managing policy drift, running phishing simulations, and having a documented runbook for incident response — not just keeping the lights on.