Microsoft 365: Top Security Use Cases

Microsoft 365 is a cloud-based productivity suite with apps that include Teams, Word, Excel, PowerPoint, Outlook, and more. Microsoft 365 is used at every level of the organization, allowing teams to collaborate on documents and projects, communicate effectively, and store content.
How Adaptive Shield Helps Secure Microsoft 365
Microsoft 365’s zero-trust architecture and user authentication tools allow users to securely create and collaborate on files, spreadsheets, and presentations. However, misconfigurations within the security settings can lead to catastrophic vulnerabilities. Adaptive Shield ensures content and collaboration security by reviewing configurations and alerting the security teams when misconfigurations put everything at risk.

Limit and Manage Sharing

Limit sharing of folders and access to shared resources such as Mailbox and Calendar.
  1. Limit shared mailbox sign-in
  2. Limit external calendar sharing policy
  3. Monitor publicly available resources, shared with external users

Create an Audit Trail

Ensure investigation teams can review logs and data in the event of a security incident.
  1. Enable global mailbox auditing
  2. Turn off mailbox audit bypass
  3. Turn on mailbox audit logging
  4. Turn on mailbox delegate auditing
  5. Turn on mailbox auditing
  6. Turn on mailbox owner auditing
  7. Enable audit log search
  8. Enable audit mail transport rules

Prevent Data Exfiltration

Protect against data leakage by disabling forward and auto-redirect rules to external addresses.
  1. Disable BCC transport rule
  2. Enforce the outbound spam filtering policy
VIEW ALL INTEGRATIONS
GDPR Compliant
ISO 27001 Compliant
ISO 27001 Certified
ISO 27701 Certified
SOC 2 Compliant
Cyber GRX