Skip to main content

Five Office 365 Security Improvements You Can Make Right Now

When it comes to cloud services, many organizations seem to forget their basic rules and responsibilities surrounding security. Some tend to think because Microsoft hosts Office 365, for example, that Microsoft will handle security for them. Unfortunately, they couldn’t be more wrong.
Microsoft will protect your data from those who attempt to gain access to its systems, as well as offer protection from data loss due to an outage or failure of their infrastructure. However, if your credentials were to become compromised, you’re on your own as far as Microsoft is concerned. During the on-premises era, we were much more risk-conscious,  and most companies had robust security policies in place. But now that data has become accessible from all over the world, it is crucial to be aware of the increase in risk and implement additional security measures to cover it.
In this article, we will share how you can improve your security within Office 365 without breaking the bank. If you have a full license of Office 365, these next five tips will be available for you to implement in your system today. If you are only paying for a subset of the services, like Exchange Online, your options will unfortunately be limited.
Login: Enable multi-factor authentication.
Most people are not good with passwords – period.
Password
Password
Fortunately, Office 365 enables multi-factor authentication as a part of your Azure Active Directory services. Users can define their preference of multi-factor authentication options: they can use the multi-factor authentication app, receive a phone call, or authenticate by text message. Since your authentication process is a combination of something you know (username and password combination) and something you have (your phone), the risk of a malicious authentication getting through is slim.
For more information on multi-factor authentication in Office 365, check out this documentation.
Email: Block Client Rules Forwarding
To prevent content from leaving the organization by mistake, most people will refer to Data Loss Prevention (DLP). However, Office 365’s DLP requires an additional license or an upgrade of your existing license.
One simple way to avoid that investment but minimize the amount of information that travels outside of your organization’s walls is to limit or block email forwarding. Many people have multiple email addresses. Sometimes we see that people will set up client rules forwarding or redirect all email to their personal account, so they have one centralized mailbox. This practice is sure to give IT and security officers major heartburn, as it only increases an organization’s risk data breaches and leaks. This forwarding block is best achieved using a transport rule in Exchange Online:
IF The Sender is located ‘Inside the organization’
AND IF The Recipient is located ‘Outside the organization’
AND IF The message type is ‘Auto-Forward’
THEN Reject the message with the explanation ‘External Email Forwarding via Client Rules is not permitted’.
Mobile: Enable mobile device management services.
Like it or not, phones have become the extension of our workplace. To make matters worse from a security perspective, these phones contain a lot of sensitive company data, and it’s usually a safe bet that our end-users haven’t taken the initiative to set up their phones as securely as possible.
For desktops and laptops, we tend to have a set of rules delivered through group policies or a similar process, but organizations tend to overlook the same need for security when it comes to mobile phones. Mobile Device Management (MDM) is natively enabled in Office 365. To set up MDM, you can go through the documentation here. With MDM you can define any number additional security measures with the ability to wipe a device remotely when needed. Why would you need to wipe a phone? Phones get stolen or lost all the time; the last thing you want is your corporate data to be available to anyone who ends up with that device next.
Documents
Documents
Documents: Configure expiration time for external sharing links. 
In a world where collaboration is the new norm, it should come as no surprise that people often use Office 365 share documents externally. There are many benefits to external sharing through Office 365: you are in control of the content, when a new version is delivered, its permissions, etc. However, when we share information, we tend not to question how long external links should be active. Is this sharing a one-time thing, or is it for long-term collaboration?
This becomes a security concern when we send out information where no sign-in is required. Since these questions should be answered on an organizational level as well as on an individual level, you’ll want to make sure there is at least an expiration time for anonymous links defined on an admin level. Unfortunately, there is no user interface for this setting (yet).
For now, you need to define this through PowerShell. You can use this script to set a default expiration timeframe of 30 days:
$tenantName = “yourTenantName”
$expirationinDays = 30
Connect-SPOService -Url “https://$($tenantName)-admin.sharepoint.com”
set-spotenant -RequireAnonymousLinksExpireInDays $expirationinDays
Of course, people will have the ability to override this date if they need to – but in the majority of cases, you will be covered by this default expiration timeframe.
Sync
Sync


Sync only to domain-joined computers.
One of the most used features of SharePoint Online and OneDrive for Business is the sync functionality. It enables offline access to content, and most people like it because it functions similarly to a user drive. However, when you allow synchronization of content to computers that are not managed by your organization, you may be opening yourself up to serious data loss or a breach. We know that the security of home computers is in most cases insufficient for storing corporate data. Office 365 enables you to configure rules that only allow synchronization to domain-joined computers. People will still be able to use Office 365 from home PCs and laptops, but no data will sync to those computers. The setting for synchronization is found under OneDrive Admin (https://admin.onedrive.com) > Sync.
These are five simple things that your organization can do today to make your Office 365 environment more secure. Remember: Securing Office 365 is your responsibility, too. Microsoft is responsible for the things you cannot control like uptime, high availability, etc. But it’s important that you take the additional steps in-house to protect your mission-critical data.

Comments

Popular posts from this blog

SharePoint Framework (SPFx).

What is SharePoint Framework   Client Side SharePoint Development using SharePoint Framework (SPFx). The SharePoint Framework (SPFx) development is a great milestone for SharePoint Client Side development. It is a page and web part model. This provides full support for client-side SharePoint development. It allows to easily integrate component with SharePoint data and supports for open source tooling. With SharePoint Framework, you can use any of your preferred web technologies and tools in your preferred development environment. It is to build responsive and mobile friendly SharePoint products and apps. SharePoint Framework (SPFx)   helps to build custom user interface extensions on top of SharePoint Online in supportive and future prepared way as SharePoint Online keeps itself updated time to time. Create new web part project You need to perform following steps:   1.       Create new project directory at your opted location md helloworld-webpart 2.   

Plan SharePoint Migration

Guide to a SharePoint Migration This blog will show how enterprises can approach their SharePoint migration with a few tried and tested action plans. This blog also details how you can successfully define a migration  roadmap, strategy, and goals for a successful SharePoint migration. There are four big transitions you’ll have to consider, before you dive into how to set up a pre-migration strategy. The Different Paths to Modern Management The following explains the four transitions and migrations that can be executed—successful or not. Cloud-first The Cloud-first path is perfect for startups, as there is no need for a migration. Essentially, everything is created in the cloud. Think: Cloud first and only cloud. Big Switch Transition The Big Switch path is often considered the most risky strategy, as organizations can never verify if the transition (also known as “big bang transition”) will end up as a success or a failure. Group by Group Transition

3 ways to filter SharePoint lists and libraries

One of the greatest benefits of metadata is the ability to filter on it and get to what you want with just a few clicks. Filtering for information is quite a common exercise these days. Every time we do online shopping, we filter for stuff. When we shop on Amazon® for shoes (something I do every day 🙂 ), we filter on cost, shoe size, reviews, brand among other things. When you go to a bookstore website, you filter for author and genre. When you research your dream car – you filter on car type, fuel economy, color. In SharePoint, we have not one, but three ways to filter SharePoint metadata! Today I would like to describe and explain all the three options to you. Option 1: Column header filter This is the most basic option that has been available ever since custom columns became available in SharePoint. Essentially this is the filtering you do using column headers. The functionality might be well familiar to many users as this is something we can do in Excel as well.