Microsoft 365 Security Checklist for Small Business Owners

by Jon Lober | NOC Technology

Essential steps to protect your data, users, and business.

Microsoft 365 security checklist

Your CEO's email is compromised. The attacker is sending invoices to your customers from her account, complete with her signature and a slightly modified bank routing number. Your accounts receivable team doesn't notice for three days. By the time you realize what happened, two customers have wired $47,000 to someone in Eastern Europe. This isn't hypothetical. We've helped Missouri businesses recover from exactly this scenario.


Business email compromise is now the most expensive form of cybercrime, and Microsoft 365 accounts are the primary target. The good news is that most of these attacks are preventable with settings that are already available in your Microsoft 365 subscription. You just need to turn them on.

What Microsoft Gives You vs. What You Need to Add

Microsoft 365 includes a solid baseline of security features, but many of them are disabled by default or require configuration. Understanding what you already have (and what you're leaving on the table) is the first step.


Every Microsoft 365 Business subscription includes basic threat protection, spam filtering, and data encryption in transit. Microsoft Defender (formerly Office 365 ATP) provides some protection against phishing and malware in email. You also get audit logging, which becomes critical when you're trying to figure out what happened after an incident.


What's missing from the default configuration? Multi-factor authentication isn't enforced. Security defaults aren't turned on for older tenants. Mailbox forwarding rules (a favorite tool of attackers) aren't blocked. Legacy authentication protocols that bypass MFA entirely are still enabled. External email sharing settings are often wide open.


The baseline matters, but configuration matters more. A default Microsoft 365 tenant is like a house with good locks, but all the windows left open. Most St. Louis businesses we work with have at least three or four critical settings misconfigured when we first assess their environment.

Multi-Factor Authentication: Why It's Non-Negotiable

MFA is the single most effective security control you can implement. Microsoft's own data shows that MFA blocks 99.9% of automated account compromise attacks. If you do nothing else on this list, do this.


Multi-factor authentication requires users to prove their identity with something they know (password) and something they have (phone, authenticator app, or hardware key). Even if an attacker steals a password through phishing or a data breach, they can't access the account without that second factor.


Here's our guide on how to enable MFA in Microsoft 365: Setting up MFA in Microsoft 365


The implementation matters as much as the decision to enable MFA. Roll it out in phases rather than flipping the switch for everyone at once. Start with administrators and finance staff (high-value targets), then expand to all users over two to three weeks. Give people time to set up their authenticator apps and understand what's changing. The Microsoft Authenticator app is free and works well, but Google Authenticator and other TOTP apps are equally valid.


One critical note: MFA is only effective if you also disable legacy authentication protocols. Older protocols like POP3, IMAP, and SMTP AUTH don't support MFA and create a backdoor around your security. Block them in your conditional access policies or tenant settings.

Password Management and Strong Authentication Practices

Passwords remain the weakest link in most security setups, not because they're inherently bad, but because humans are bad at managing them. The average employee reuses passwords across multiple services, which means a breach at some random website can compromise your business systems.


Microsoft 365 includes Azure AD Password Protection, which prevents users from choosing common or easily guessed passwords. Enable it. You can also create custom banned password lists that include your company name, products, and other predictable choices. This stops people from using "CompanyName2026!" as their password.


Password expiration policies have fallen out of favor in security circles. Forcing frequent password changes leads to predictable patterns (Winter2026! becomes Spring2026!) and increases help desk calls. NIST now recommends long, complex passwords changed only when compromise is suspected. Consider setting your policy to 180 days or even removing expiration entirely if you have strong MFA in place.


For privileged accounts (admins, finance, HR), implement passwordless authentication where possible. Windows Hello for Business, FIDO2 security keys, and the Microsoft Authenticator app's passwordless option all eliminate passwords entirely for sign-in. This is the direction authentication is heading, and you can start moving there today.


A password manager is essential for your team. Individual users should use one for personal accounts, and you might consider a business password manager for shared credentials. This removes the temptation to reuse passwords and makes strong, unique passwords practical.

Email Security and Threat Detection Setup

Email is where most attacks begin. Phishing, business email compromise, and malware all commonly arrive through the inbox. Microsoft 365 includes several protection features that need to be configured correctly.


Start with Microsoft Defender for Office 365 (included in Business Premium and higher plans). Configure Safe Attachments to detonate suspicious files in a sandbox before delivery. Configure Safe Links to rewrite URLs and check them at click time, catching malicious links that weren't flagged when the email first arrived.


Anti-phishing policies deserve attention. Enable impersonation protection for your executives and finance team. Attackers often register domains that look similar to yours (n0ctechnology.com instead of noctechnology.com) and send emails pretending to be the CEO. Impersonation protection flags these attempts.


Set up external email warnings. When an email comes from outside your organization, display a banner warning users. This simple visual cue helps people pause before clicking links or responding to requests. You can configure this through mail flow rules in Exchange Online.


Block auto-forwarding to external domains. Attackers who compromise an account often set up forwarding rules to exfiltrate email silently. A rule that forwards all email to an external address should never be allowed. Block this in your tenant settings.


Review your audit logs regularly. Microsoft 365 logs sign-in activity, mailbox access, file sharing, and administrative changes. Set up alerts for suspicious activity (sign-ins from unusual locations, multiple failed attempts, new inbox rules created). You don't need to watch logs manually, but you should have alerts configured.

Employee Training: Addressing the Weakest Link

Technology can only do so much. The most sophisticated security tools in the world won't help if an employee gives their password to an attacker over the phone or clicks a link they shouldn't.


Security awareness training doesn't have to be expensive or complicated. What matters is consistency and relevance. Monthly reminders beat annual compliance videos. Real examples from your industry beat generic warnings about Nigerian princes.


Phishing simulations help, but only if you handle them correctly. The goal isn't to catch and shame employees. The goal is to identify who needs additional training and to give everyone practice recognizing suspicious emails. When someone fails a simulation, that's a training opportunity, not a disciplinary event.


Teach your team to verify unusual requests through a different channel. If the CEO emails asking for a wire transfer, call the CEO directly (on a known phone number, not one from the email) to confirm. If a vendor sends new banking details, call them to verify. These simple verification steps stop most business email compromise attacks.


Create a culture where reporting suspicious emails is encouraged, not penalized. You want employees forwarding questionable messages to IT rather than clicking first and hoping nothing bad happens. Make the reporting process easy and thank people who report, even when the email turns out to be legitimate.

Putting It All Together

Microsoft 365 security isn't about buying more tools. It's about configuring the tools you already have. MFA, email protection, and employee awareness cover the vast majority of attack vectors that affect small businesses.


Get started with MFA today! Then work through email security settings and forwarding rules. Train your employees on what to watch for. These aren't expensive projects; they're configuration changes and habit adjustments that dramatically reduce your risk.


If you're not sure where your Microsoft 365 tenant stands, we've published our pricing so you know what an assessment actually costs before you call anyone.

Frequently Asked Questions

What Microsoft 365 plan do I need for proper security? +
Microsoft 365 Business Premium includes the essential security features most small businesses need, including Defender for Office 365, Intune device management, and Azure AD Premium P1. Business Basic and Standard work but lack advanced threat protection and require additional licenses for full security coverage.
How long does it take to set up MFA for my whole company? +
The technical configuration takes less than an hour. The rollout to users typically spans two to three weeks if you want to minimize disruption. We recommend starting with admin accounts, then expanding to finance and executives, then all employees. This gives IT time to support users who need help with authenticator app setup.
Will MFA slow down my employees? +
The initial setup takes five to ten minutes per user. After that, most employees see an MFA prompt once per device (or once per session depending on your settings). The Microsoft Authenticator app supports push notifications, so approving a sign-in is a single tap. Most Greater St. Louis businesses we work with report minimal productivity impact after the first week.
Can attackers bypass MFA? +
Sophisticated attackers can bypass MFA through techniques like SIM swapping, real-time phishing proxies, or MFA fatigue attacks (bombarding users with prompts until they approve). However, MFA still blocks 99.9% of automated attacks. For high-risk accounts, consider hardware security keys (FIDO2), which are resistant to these bypass techniques.
What's the first thing I should do if I suspect an account is compromised? +
Reset the password immediately, then revoke all active sessions (you can do this in Azure AD). Check for forwarding rules in the mailbox, review sign-in logs for unusual locations, and look for any inbox rules the attacker may have created. If you don't have IT staff who can do this quickly, contact your IT provider or an incident response team.
How often should we run phishing simulations? +
Monthly simulations work well for most Missouri businesses. More frequently than that feels punitive; less frequently doesn't build the habit of scrutinizing emails. Vary the difficulty and type of simulations to cover different attack vectors (credential theft, malware links, business email compromise scenarios).
Is Microsoft 365 security enough, or do we need additional tools? +
For most small businesses (under 100 employees), properly configured Microsoft 365 Business Premium provides adequate protection. Larger organizations or those in regulated industries (healthcare, finance, legal) may need additional tools for endpoint detection, SIEM, or compliance monitoring. Start with what Microsoft provides and add tools only when you've identified specific gaps.
Using multi-factor authentication
By Jon Lober April 2, 2026
Learn how to set up MFA in Microsoft 365 step-by-step. Plain-English guide for non-technical users. Protect your business email in St. Louis and beyond.
docusign scam
By Jon Lober March 30, 2026
Learn how to protect your St. Louis business from DocuSign phishing and email scams. Technical defenses, team training, and policies that stop attacks.
By Jon Lober March 23, 2026
Learn what a next-generation firewall does and why traditional firewalls miss modern threats. A practical guide for Missouri business owners.
More Articles