In this post, I will explain how to configure Microsoft Defender for Office 365 in your tenant. Since I have already covered most of these settings in my earlier blogs, I thought it was time to combine all the information into one post. I will link to my previous articles, so you can use this post as a summary to help strengthen your Microsoft Defender for Office 365 configuration, @ the speed of email!
NOTE: These recommendations mostly align with the strict recommendations of the Configuration Analyzer and the Microsoft Secure Score in XDR.
Configuration Checklist
1: Setup Preset Security Policies
If your organization does not have the budget or time, Preset Security Policies ensure you can maintain a balance between keeping harmful content away from users and avoiding unnecessary disruptions. These policies can be configured within five minutes with just a few clicks. Unlike custom policies, which are highly configurable, most settings in Preset Security Policies cannot be modified.
The following Preset Security Policies are available:
Standard Preset Security Policy - A baseline protection profile that provides:
- Exchange Online Protection (inbound anti-spam, anti-malware, and anti-phishing)
- Microsoft Defender for Office 365 protection (Safe Attachments and Safe Links)
Strict Preset Security Policy - A more aggressive protection profile for selected users, such as high-value or priority accounts. It provides:
- Exchange Online Protection (inbound anti-spam, anti-malware, and anti-phishing)
- Microsoft Defender for Office 365 protection (Safe Attachments and Safe Links)
Built-in Protection Preset Security Policy - Default Safe Attachments and Safe Links policies for Defender for Office 365
- Provides baseline Microsoft 365 protection applied automatically to all users, safeguarding them against malicious links and attachments without requiring configuration.
Reference:
2: Configure Exchange Online Protection Threat policies
- Anti-spam policies
- Anti-spam policies give you control over both inbound and outbound email in Exchange Online. Within these policies, you can configure settings such as completely blocking automatic forwarding for outbound mail.
- Anti-malware policies
- Anti-malware policies provides an additional layer of protection by blocking specific file types for both inbound and outbound mail traffic.
- Anti-phishing policies
- Anti-phishing policies provides control over incoming phishing emails, for instance, in cases where someone may attempt to impersonate your CEO or send messages from a domain that closely resembles yours.
3: Configure Microsoft Defender for Office 365 Protection Threat policies
- Safe Attachments policies
- Safe Attachments scans and evaluates attachments for malicious content before delivering messages to recipients. It also has the ability to protect files in SharePoint, OneDrive, and Microsoft Teams.
- Safe Links policies
- Safe Links scans URLs in incoming messages and checks them for malicious content at the time they are clicked. Safe Links protection works in Email/Outlook, Microsoft Teams, and Office apps.
4: Use custom release request quarantine policies (instead of self-release)
- Quarantine policies
- If you are not using Preset Policies, you can create a quarantine policy to customize the user experience for quarantined messages. Quarantine policies give you more control over the quarantine for your end users and allow you to decide which quarantined items they are allowed to release.
5: Hardening Microsoft Defender for Office 365’s DKIM and DMARC configuration
- Hardening DKIM and DMARC configuration
- Improve email security in Microsoft Defender for Office 365 by fine-tuning DKIM, configuring DMARC for the MOERA domain, and blocking inbound DMARC failures from reaching user inboxes.
6: Reject Direct Send in Exchange Online
- Exchange Online: Reject Direct Send
- Direct Send is a method used to send emails directly to Exchange Online hosted mailboxes from on-premises devices, applications, or third-party cloud services, using the MX record endpoint of your accepted domain in Exchange Online.
7: DNS configuration
- Inbound email:
- MTA-STS Policy
- MTA-STS is a security mechanism that allows the sending (outbound) mail server to enforce the use of HTTPS secured policies published by in your DNS. This ensures that TLS connections between the sending mail server and your mail server are both encrypted and valid.
- Configure inbound SMTP DANE with DNSSEC in Exchange Online
- SMTP DANE is a security mechanism that uses DNSSEC to allow the sending mail server to verify the TLS certificate of your mail server.
- MTA-STS Policy
NOTE: Neither SMTP DANE nor MTA-STS is universally better; the choice depends on the specific context and needs of the organization. SMTP DANE provides stronger security, but requires DNSSEC, and not every DNS provider supports DNSSEC yet. Using the two together can provide the best of both worlds, increasing security through a layered approach.
- Outbound email:
- Deploy SPF, DKIM, and DMARC the right way
- SPF, DKIM, and DMARC are critical email authentication protocols that help prevent email spoofing, phishing attacks, and domain impersonation for outbound email.
- Get a handle on your SPF record
- It is crucial to have a well-structured SPF procedure to avoid future problems, especially since exceeding the DNS lookup limit of 10 can cause issues.
- Deploy SPF, DKIM, and DMARC the right way
8: Promote a think before you click mindset
- Attack simulation training
- With Microsoft Defender for Office 365, you can create an attack simulation training to identify vulnerable users and mitigate potential threats before they impact your organization.
9: Understand how inbound email works in Microsoft 365
- How inbound email works in Microsoft 365
- To understand why your environment experiences false positives and false negatives, you first need to know how Microsoft 365 processes inbound email and how to correctly use submissions and the Tenant Allow/Block List.
Final words
Since email security is still one of the main attack vectors used by malicious actors, you should not underestimate the importance of a strong Microsoft Defender for Office 365 setup, or any email security solution (Secure Email Gateway). If you have serious concerns about email privacy, you may also want to consider signing and encrypting your or the messages of your key users using PGP or S/MIME. These methods ensure that your messages remain private and protected from unwanted access by big tech providers (even if you send them through Microsoft 365) or governments.