top of page

3 Critical Microsoft 365 Security Settings You Might Have Missed

Are you confident your Microsoft 365 environment is properly secured? In this week's tech tip, we're exploring three often-overlooked security settings that could be leaving your business vulnerable. Let's dive into practical, actionable steps you can take today.*


1. Universal Audit Log: Your Digital Security Camera 🎥


Ever wished you could replay who did what in your Microsoft 365 environment? That's exactly what the Universal Audit Log does - but here's the catch: it might not be turned on in your organization.


Why This Matters:

- Think of it as your organization's security camera system

- Records all user and admin activities

- Essential for security investigations and compliance


Quick Setup Guide:

2. Navigate to Audit

3. Click "Start recording user and admin activity"


💡 **Pro Tip:** Standard retention is 90 days, but regulated industries should consider Premium for extended retention.



2. OAuth App Registration Controls: Your App Security Guard 🛡️


Remember those random apps requesting access to your Microsoft 365 data? Without proper OAuth controls, you might be unknowingly letting in uninvited guests.


Real-World Example:

We recently helped a client discover an unauthorized app that had been quietly collecting company data for months. Don't let this happen to you!


Essential Steps:

1. Restrict app registration to admins only

2. Review and set app consent policies

3. Enable risk-based authentication

4. Regularly audit approved applications



3. Location-Based Login Settings: Your Geographic Firewall 🌎


In today's remote work world, someone logging in from an unexpected location could be a red flag. Here's how to set up your geographic defense system.


Key Configuration Steps:

1. Define trusted locations

2. Set up suspicious login alerts

3. Configure risk-based challenges

4. Document exceptions for travelers



Taking Action Today 🎯


Not sure if these settings are configured correctly in your environment? Here's your action plan:


1. **Audit Check:** Review each setting

2. **Document:** Note current configurations

3. **Plan:** Create an implementation timeline

4. **Monitor:** Set up regular review schedules


Need Help?

Our Microsoft specialists at CompleteMSP can perform a comprehensive security audit of your environment. We'll ensure these critical settings are properly configured to protect your business.


📞 Contact us today:

- Phone: 256-684-8083


**Remember: Security isn't just about having the right tools – it's about configuring them correctly.

bottom of page