Microsoft 365 securityΒΆ

A crystal ball mounted on a cluttered desk next to a stack of parchment marked SHARED WITH EVERYONE. A small dragon has fallen asleep on the keyboard. The crystal ball is displaying what appears to be the entire donor ledger. Nobody is watching.

M365 is probably the operational core of the organisation. Email, documents, collaboration, video calls, scheduling. It is also the most common target for phishing, business email compromise, and account takeover in the non-profit sector.

The default configuration of a Microsoft 365 tenant that has been running for several years without a dedicated security architect is not secure by modern standards. That is not a criticism of whoever set it up. Defaults change. Guidance evolves. What was fine in 2019 is not fine now.

This section covers the M365-specific configuration work that follows from the identity foundation: securing Exchange, SharePoint, and Teams; understanding what Defender features you have and which are actually switched on; and getting visibility into what is happening in the tenant.