How to Protect Microsoft 365 Accounts From Phishing Attacks

A practical step-by-step guide for Canadian small businesses using Microsoft 365 Business Standard or Premium — written by the managed IT team at CtrlShift IT Services.

Estimated reading time
8 minutes
Who this guide is for
Owners, office managers, and IT decision-makers at Canadian small businesses (5–50 employees) on Microsoft 365 who want to reduce their exposure to phishing-based account takeover and email fraud.
Last reviewed: April 2026

Phishing Is the #1 Entry Point for Small Business Breaches

Most small business breaches do not start with a sophisticated zero-day exploit or a brute-force attack against your firewall. They start with one employee clicking one convincing email. Phishing is the leading cause of Microsoft 365 account takeovers — and a compromised M365 account is not just a lost inbox. It is access to SharePoint, OneDrive, Teams, and every integration your business has connected to that identity.

This guide stays focused on phishing prevention and response. For the wider Microsoft 365 posture — endpoint security, backup, and admin protection — branch into the Microsoft 365 Security Checklist.

How a phishing-led SMB incident usually unfolds
Phishing email
Lands in inbox
User clicks
Link or attachment opened
Credentials captured
Password or token stolen
Tenant access
Mailbox or SharePoint reached
Fraud or disruption
BEC, data theft, ransomware
Each section below is aimed at breaking one or more links in that chain.

Four Protection Layers for Phishing Defence

Phishing defence is not one toggle in Microsoft 365. Small-business tenants hold up best when awareness, identity, email controls, and response discipline all reinforce each other.

User Awareness

Short monthly training, one-click reporting, and a no-blame culture reduce how often suspicious emails become incidents.

Identity Protection

MFA, Conditional Access, and blocking legacy auth stop most credential-only phishing from turning into mailbox access.

Email Security Controls

Anti-phishing, Safe Links, Safe Attachments, SPF, DKIM, and DMARC reduce spoofing, malicious links, and attachment risk.

Response & Recovery

Fast reporting, session revocation, mailbox review, and a practiced response process shorten dwell time and limit fraud.

The Threat Types Most SMB Teams Actually See

Credential Phishing

Fake login prompts steal passwords or session cookies and are still the most common entry point into Microsoft 365 tenants.

Business Email Compromise

Attackers quietly monitor real mailboxes, learn approval flows, and redirect payments or payroll without deploying malware.

Malicious Attachments

Weaponized invoices, resumes, and “shared documents” deliver malware or lure users into enabling risky macros.

Spot the Red Flags

Use this example to show staff what a typical Microsoft 365 phishing email feels like. Click the numbered markers to reveal why each detail matters.

Inbox preview
Microsoft 365 Account Verification
Example
From: Microsoft Account Team <security-review@microsoft365-alerts.net>
Subject: Action required: your mailbox will be suspended today

Hello,

We detected unusual sign-in activity on your Microsoft 365 account. To avoid deactivation, verify your mailbox and sign in again using the secure link below.

Review Mailbox Activity

This secure review page expires in 15 minutes. Failure to act may result in email delivery disruption.

1. Employee Awareness — Your First Line of Defence

Technical controls can be bypassed when users act under social pressure. A convincing invoice email, a spoofed CEO message, or a fake Microsoft login page are designed to move faster than caution. Awareness training does not eliminate that risk — but it measurably reduces it, and it makes your other controls more effective by ensuring staff actually use the Report Message button.

Modern phishing attempts are highly targeted. Attackers research your business, reference real supplier names, and send from spoofed or compromised accounts your staff already trust. Training your team to slow down and verify before clicking — especially for unexpected requests involving payments, credentials, or urgency — addresses the most exploited vulnerability in any small business: human reflex.

  • Install the Microsoft Report Message add-in for all users — one click to flag suspicious email and feed data to Defender
  • Run quarterly simulated phishing using Microsoft Attack Simulator (included in Business Premium) — frequency beats length
  • Teach staff the three red flags: unexpected urgency, requests involving credentials or payments, and sender addresses that do not match the display name
  • Make it socially safe to report a suspicious click — staff who report quickly limit damage significantly

2. Configure Microsoft Defender Anti-Phishing Policy

Microsoft Defender includes a dedicated anti-phishing policy that catches impersonation attacks, spoofed senders, and domain lookalikes. Out of the box, basic protection is on — but the controls that catch targeted attacks against your specific business are off by default and require manual configuration.

Navigate to the Microsoft Defender portal → Email & Collaboration → Policies & Rules → Threat Policies → Anti-phishing. On the default policy, configure:

  • Impersonation protection — add your CEO, finance lead, and any frequently impersonated domain partners as protected users and domains
  • Mailbox intelligence — enable this to flag messages from senders your users have not previously corresponded with
  • Spoof intelligence — review the spoof intelligence report weekly until you understand your legitimate mail sources
  • Actions — set impersonated sender detection to Quarantine rather than Junk; it gives you a review queue instead of hoping staff notice

Business Standard includes basic anti-phishing. Business Premium (or the Defender for Office 365 Plan 1 add-on) unlocks the full impersonation and intelligence features. For admin accounts, apply the Strict preset security policy — it is the most conservative configuration Microsoft offers and should be the baseline for anyone with elevated privileges.

3. Enforce Multi-Factor Authentication

99%+
of automated account-takeover attempts are blocked when phishing only steals a password and MFA is enforced correctly.

MFA is the single most effective control against credential-based phishing. A stolen password alone is not enough to access an account when MFA is enforced — which is why Microsoft's own data puts MFA at blocking over 99% of automated account takeover attempts.

The fastest path for most small businesses: enable Security Defaults in Microsoft Entra admin centre (formerly Azure AD). This enforces MFA registration for all users and blocks legacy authentication in one setting — no licence upgrade required.

Identity Layer

Why identity protection stops most phishing attacks

Most phishing incidents only become breaches when a stolen password turns into a successful sign-in. Identity controls break that handoff. They do not stop every message from landing, but they stop most mailbox-takeover attempts from becoming business email compromise, data theft, or ransomware staging.

Phishing-resistant MFA

FIDO2 keys or passkeys stop modern token-theft kits far better than SMS codes. Use them first for admins, finance roles, and anyone approving wire changes.

Conditional Access

Conditional Access checks context like device state, sign-in risk, and geography so a stolen password plus weak MFA is still not enough in the wrong conditions.

Legacy auth blocking

IMAP, POP, and older basic-auth flows bypass MFA completely. Blocking them removes the side door attackers test after they steal credentials.

  • Prefer Microsoft Authenticator push approval or passkeys over SMS codes — SMS is vulnerable to SIM swapping
  • Enforce MFA on every account, including service accounts and shared mailboxes — these are common gaps that attackers specifically target
  • Register two break-glass admin accounts with physical FIDO2 security keys and store them in a documented, secure location
  • Document your MFA enforcement as evidence — Canadian cyber insurers verify this at renewal

4. Conditional Access Basics

Conditional Access moves beyond password-and-MFA by evaluating the context of each sign-in — location, device compliance, sign-in risk — and enforcing policies based on that context. It requires Microsoft 365 Business Premium or a Microsoft Entra ID P1 licence.

For a 5–50 employee business, four policies cover most of your exposure:

  • Require MFA for all users — even if Security Defaults is on, an explicit Conditional Access policy gives you more control over exceptions
  • Block legacy authentication — create an explicit policy targeting legacy auth clients as a belt-and-suspenders measure
  • Require compliant device for admin access — admins should only manage the tenant from a known, managed device
  • Block sign-ins from countries you do not operate in — most Canadian small businesses have no legitimate sign-in traffic from Eastern Europe, Southeast Asia, or West Africa

Start every policy in report-only mode for two weeks before enforcing. You will catch shared mailboxes, line-of-business apps, and device exceptions that would otherwise trigger a support call on day one.

5. Block Legacy Authentication Protocols

Legacy protocols — IMAP, POP3, basic SMTP auth, Exchange ActiveSync with basic auth — cannot enforce MFA. No matter how strong your MFA rollout is, a single legacy-auth endpoint leaves a side door open that attackers specifically scan for. A stolen password is all they need.

Blocking legacy auth is one of the highest-impact, lowest-effort changes in this guide — and it is now flagged as a gap by most Canadian cyber insurance underwriters.

  • If using Security Defaults: legacy auth is blocked automatically — confirm it is enabled in Entra admin centre → Properties
  • If using Conditional Access: create an explicit block policy targeting legacy auth clients for belt-and-suspenders coverage
  • Before enforcing: audit for any line-of-business apps using basic SMTP auth to send mail — printers, scanners, CRMs, and older helpdesk tools are the most common gotchas
  • Migrate any app still using basic auth to OAuth or modern auth before blocking

6. Domain Authentication: SPF, DKIM, and DMARC

These three DNS records work together to tell receiving mail servers whether email claiming to come from your domain is actually from you. Without them, an attacker can send a phishing email that appears — to the recipient and their spam filter — to come from your own domain. This is how supplier fraud and CEO impersonation attacks are executed at scale.

Email Trust Layer

Preventing domain spoofing with SPF, DKIM, and DMARC

Domain spoofing protection works best when all three records are treated as one system: SPF says who can send, DKIM proves the message was signed correctly, and DMARC tells receiving servers how strictly to enforce the result.

SPF

Lists the services allowed to send mail for your domain, including Microsoft 365 and any marketing or billing platforms you use.

DKIM

Adds a cryptographic signature to outbound mail so receiving servers can verify the message really came from an approved sender.

DMARC

Tells receiving systems whether to monitor, quarantine, or reject messages that fail SPF or DKIM alignment checks.

SPF (Sender Policy Framework)

SPF is a DNS TXT record that lists the mail servers authorized to send on behalf of your domain. For Microsoft 365, add include:spf.protection.outlook.com to your SPF record. If you also send from a marketing platform or third-party system, include those as well.

DKIM (DomainKeys Identified Mail)

DKIM adds a cryptographic signature to outbound email that receiving servers verify against a public key in your DNS. Enable it in the Defender portal under Email & Collaboration → Policies → Email Authentication Settings → DKIM. Microsoft generates the keys; you add two CNAME records to your DNS.

DMARC (Domain-based Message Authentication)

DMARC tells receiving servers what to do when email fails SPF or DKIM alignment. Start with p=none to monitor for two to four weeks, then move to p=quarantine, then p=reject. The monitoring phase shows you all legitimate mail streams sending on your behalf — marketing tools, CRMs, and invoicing platforms that need to be in SPF before you enforce.

Check your current status with a free MXToolbox DMARC lookup. Related guide (coming soon): How to Set Up DMARC for Your Business Domain.

8. Enable Safe Attachments

Safe Attachments routes incoming email attachments through a detonation sandbox before delivering them — opening the file in a controlled environment to detect malicious behaviour that signature-based antivirus would miss. This catches zero-day malware, macro-based payloads, and weaponized Office documents.

Enable Safe Attachments in Defender portal → Threat Policies → Safe Attachments. Recommended settings:

  • Set the action to Dynamic Delivery — this delivers the email body immediately and holds only the attachment during scanning, so staff are not waiting on a sandbox for every message
  • Enable Safe Attachments for SharePoint, OneDrive, and Microsoft Teams — this is a separate toggle in the same policy and is often overlooked
  • Review quarantined attachments weekly — some legitimate attachments with unusual macro structures will be held, and you need a process for releasing them

Safe Attachments also requires Defender for Office 365 Plan 1 (Business Premium or add-on).

Phishing Response Flow

The practical goal is not zero clicks. It is shortening the time between a suspicious email and the response steps that limit mailbox abuse.

Suspicious email reported
User flags the message through the Report Message add-in or directly to IT.
Assess impact
Confirm whether the user only received the message, clicked it, entered credentials, or approved MFA.
Isolate account if needed
If compromise is possible, disable sign-in or isolate the device while triage begins.
Reset password and revoke sessions
Rotate credentials, revoke active sessions, and force fresh authentication.
Review mailbox rules and sign-in logs
Look for forwarding rules, OAuth grants, unfamiliar IPs, and suspicious app activity.
Communicate next steps
Tell leadership and affected staff what happened, what changed, and what to watch for next.

9. What to Do If an Employee Clicks a Phishing Link

Fast response limits damage. The worst outcome is not the initial click — it is the 48 hours of undetected access that follow. Have this process written down before you need it, not after.

  1. Isolate the device from the network — disconnect from Wi-Fi or Ethernet while you triage. Do not power it off; memory forensics may be needed.
  2. Reset the user's Microsoft 365 password immediately — in Microsoft Entra admin centre, reset the password and force re-registration of MFA.
  3. Revoke all active sessions — in Entra admin centre, navigate to the user → Revoke sessions. This kills any authenticated tokens the attacker may already hold.
  4. Audit mail forwarding rules — attackers frequently add a silent forwarding rule as their first action after gaining access. Check Exchange admin centre → Mailboxes → the affected user → Mail Flow Settings → Message Forwarding.
  5. Review sign-in logs — in Entra admin centre → Sign-in logs, filter on the compromised account and look for anomalous locations, IP ranges, or application access you do not recognize.
  6. Check OAuth app consent grants — attackers sometimes trick users into granting a malicious third-party app access to the mailbox. Check Entra admin centre → Enterprise Applications for any unfamiliar apps with broad mail permissions.
  7. Notify your IT provider or internal security contact before making further changes — evidence preservation matters for insurance claims and breach notification requirements.

10. How Attackers Bypass Basic Protections

Understanding the attack methods helps you decide which controls are worth the investment. These are the bypass techniques we see most often in small business incidents:

  • AiTM (Adversary-in-the-Middle) phishing kits — rather than asking for your password directly, these kits proxy a real Microsoft login page. When you complete MFA, the kit steals your authenticated session token and uses it in real time. The attacker is logged in as you before you finish. Defence: phishing-resistant MFA (FIDO2 security keys or passkeys) for admin and finance roles; Conditional Access sign-in risk policies for everyone else.
  • OAuth consent phishing — a link prompts the user to grant a malicious third-party app access to their mailbox. No credentials are stolen — the app gets a legitimate OAuth token. The mailbox is now accessible to the attacker for as long as the grant is active. Defence: restrict third-party OAuth app consent in Entra admin centre; review existing grants quarterly.
  • QR code phishing — the malicious link is embedded in a QR code image rather than a clickable URL. Most email security tools scan URLs in text; they do not decode images. The attack moves to the user's personal phone, bypassing all corporate email controls. Defence: user training to never scan QR codes from unsolicited email; Safe Links cannot help here.
  • Trusted sender compromise — rather than spoofing your supplier, the attacker first compromises the supplier's actual mailbox and then sends from a legitimate address. SPF, DKIM, and DMARC pass. Defence: train staff to verify unexpected payment or credential requests via phone using a known number, regardless of sender reputation.

11. When to Involve a Managed IT Provider

These controls are configurable without external help — but configuration is only part of the picture. The gaps we most often find when auditing self-managed tenants are not missing settings; they are missing oversight. No one is watching the sign-in logs. Alerts are firing with no one reading them. A Conditional Access policy was set to report-only and never enforced.

Consider engaging a managed IT provider when:

  • No one internally monitors sign-in logs, Defender alerts, or the quarantine queue on a documented schedule
  • You are unsure whether your current Defender policies are correctly configured and tested
  • You have had a suspicious incident — a password reset you did not initiate, an unexpected forwarding rule, an unfamiliar app in your Entra app list
  • You are approaching a cyber insurance renewal and need documented evidence of controls
  • You need Conditional Access but are not confident about testing it in report-only mode before enforcing

A managed provider should be actively monitoring your tenant for anomalous sign-ins, managing policy drift, running phishing simulations, and having a documented runbook for incident response — not just keeping the lights on.

Frequently Asked Questions

Does Microsoft 365 Business Standard include phishing protection?
Basic Defender anti-phishing and spoof intelligence are included. Safe Links and Safe Attachments require Business Premium or a Defender for Office 365 Plan 1 add-on. If your team handles client financial data or regulated information, the Premium upgrade is worth it.
Is turning on Security Defaults enough for a small business?
Security Defaults enforces MFA for all users and blocks legacy authentication — both high-impact controls. But it does not give you Safe Links, Safe Attachments, anti-impersonation policies, or granular Conditional Access. Think of it as a strong starting point, not a complete posture.
How do I know if my domain has SPF and DMARC configured?
Run a free lookup at MXToolbox.com — enter your domain and check SPF, DKIM, and DMARC records separately. A missing or broken DMARC record means attackers can send email that appears to come from your own domain, and receiving servers will not know to block it.
Can phishing attacks bypass MFA?
Yes — modern adversary-in-the-middle (AiTM) kits proxy a real Microsoft login page, steal your session token after a successful MFA challenge, and use it to log in without your credentials. Phishing-resistant MFA (FIDO2 security keys or passkeys) eliminates this entirely. Standard Authenticator app MFA still blocks most attacks but is not immune to AiTM.
What is the most common way small businesses in Canada get compromised?
Credential phishing followed by business email compromise (BEC). The attacker silently reads email for days or weeks to understand payment processes, then diverts a wire transfer or impersonates the owner to redirect payroll. The mailbox access itself is often never detected without proactive monitoring.
How long does it take to configure these protections?
MFA and Security Defaults: under 30 minutes with no disruption to users. Anti-phishing, Safe Links, Safe Attachments policies: 1–2 hours including testing. SPF/DKIM/DMARC: 1–3 hours depending on DNS access and whether you send from multiple platforms. Legacy authentication blocking needs a one-hour audit first to avoid breaking line-of-business apps.
Do I need Business Premium or will Business Standard work?
Business Standard covers MFA, basic anti-phishing, spoof intelligence, and SPF/DKIM/DMARC. Business Premium adds Safe Links, Safe Attachments, Conditional Access, Microsoft Entra ID Protection, and Attack Simulator. If your team handles client financial, legal, or health data — or if you are going through cyber insurance underwriting — Premium is the right licence tier.
What should I do immediately after a suspected phishing compromise?
Reset the compromised account password, revoke all active sessions in Microsoft Entra admin centre, audit mail forwarding rules, and review sign-in logs for other affected accounts. Do not reimage the device or delete logs until an IT professional reviews them — that evidence matters for your cyber insurance claim.