{"id":2349,"date":"2019-01-21T10:26:43","date_gmt":"2019-01-21T10:26:43","guid":{"rendered":"https:\/\/www.varutra.com\/blog\/?p=1843"},"modified":"2023-04-05T13:58:56","modified_gmt":"2023-04-05T08:28:56","slug":"best-practices-to-harden-office-365","status":"publish","type":"post","link":"https:\/\/www.varutra.com\/varutravrt3\/best-practices-to-harden-office-365\/","title":{"rendered":"Best Practices to Harden Office 365"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/varutra-1a3b6.kxcdn.com\/wp-content\/uploads\/2019\/01\/Office-365-1-wpp1596612564110-1024x512.jpg\"  class=\"sh-overlay-item sh-table-cell ls-is-cached lazyloaded\" data-rel=\"lightcase\" title=\"Office365 - Varutra Consulting\"><br \/>\n<strong>Here are some best practices to harden office 365 and ensure your data remains protected.<\/strong><\/p>\n<h3><strong>1. Password Policy<\/strong><\/h3>\n<p>It is always recommended to use a strong password policy to help secure the data and service access. In<br \/>\nOffice 365 for cloud-only users and active directory synced users, passwords expire after 90 days by<br \/>\ndefault.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>2. Single Sign-On<\/strong><\/h3>\n<p>Single sign-on is convenient as well as allows password policies to be managed in a centralized place.<br \/>\nMicrosoft offers its own single sign-on solution, Azure Active Directory, which allows users to log in using the same password as they do for on premises Microsoft products, as well as cloud products from other providers.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>3. Use Multi-Factor Authentication (MFA)<\/strong><\/h3>\n<p>Multi-factor authentication makes it more difficult for a third party to gain access to an account by<br \/>\nrequiring an additional authentication measure after submitting the username and password. The<br \/>\nsecondary authentication methods supported by Office 365 include the use of mobile app notification, a one-time password generated by a mobile app or sent to the user via a phone call or SMS text message, and per-app passwords used with clients such as Outlook. Some of the MFA solutions are Azure AD, Okta, One Login, Ping Identity, and Centrify.<br \/>\nReference URL: https:\/\/docs.microsoft.com\/en-us\/office365\/admin\/security-and-compliance\/set-upmulti-factor-authentication?view=o365-worldwide<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>4. Configure Data Loss Prevention (DLP)<\/strong><\/h3>\n<p>A data loss prevention strategy ensures that confidential or personal data can&#8217;t be uploaded, shared or<br \/>\nemailed. DLP is available in SharePoint Online and Exchange and can also be integrated into Enterprise<br \/>\nSearch. With this, create policies to restrict content being saved to certain locations, such as One Drive<br \/>\nfor Business and SharePoint Online sites.<br \/>\nReference URL: https:\/\/docs.microsoft.com\/en-us\/office365\/securitycompliance\/data-loss-preventionpolicies<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>5. Turn on Office 365 Cloud App Security<\/strong><\/h3>\n<p>Set up alerts with Office 365 Cloud App Security help admins can review unusual or risky user activity,<br \/>\nsuch as downloading large amounts of data, multiple failed sign-in attempts, or sign-ins from an<br \/>\nunknown or dangerous IP address. Organizations with an Office 365 Enterprise E5 plan can start using<br \/>\nOffice 365 Cloud App Security right away.<br \/>\nReference URL: <a href=\"https:\/\/docs.microsoft.com\/en-us\/office365\/securitycompliance\/turn-on-office-365-cas\">https:\/\/docs.microsoft.com\/en-us\/office365\/securitycompliance\/turn-on-office-365-cas<\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><strong>6. IP Filtering<\/strong><\/h3>\n<p>To reduce the risk of account compromise is to disallow extranet access to corporate cloud services such as Office 365. If an attacker were to obtain an account credential, they would be unable to successfully log into the account, unless he or she is on the corporate network or accessing via virtual private network (VPN). Microsoft supports IP filtering, referred to variously as \u201cIP Whitelist\u201d and \u201cTrusted IPs,\u201d for customers using either Azure Active Directory or federating user identity with their on-premises Active Directory.<br \/>\nReference URL: https:\/\/docs.microsoft.com\/en-us\/office365\/securitycompliance\/configure-theconnection-filter-policy<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>7. Configure Alert Policies<\/strong><\/h3>\n<p>Creating alert policies in Office 365\u2019s Compliance center can assist in meeting organization\u2019s data<br \/>\nsecurity obligations. For example, alerts can warn about sharing confidential information anytime about<br \/>\nemail contacts that aren\u2019t listed as authenticated in the organization\u2019s network. These preemptive<br \/>\nnotices can educate employees on data sharing best practices and prevent data leaks. Office 365 offers<br \/>\nseveral built-in alert policies that help determine permissions abuse, data governance risks, and<br \/>\nmalware risks.<br \/>\nReference URL: <a href=\"https:\/\/docs.microsoft.com\/en-us\/office365\/securitycompliance\/alert-policies\">https:\/\/docs.microsoft.com\/en-us\/office365\/securitycompliance\/alert-policies<\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><strong>8. Office 365 Message Encryption<\/strong><\/h3>\n<p>Message encryption allows to send a message to a recipient encrypted. The recipient receives an email<br \/>\nwith a link to a page on a download portal, where users authenticate using their Office login or a onetime passcode to view the message. To use Office 365 Message Encryption (OME), organization must include an Exchange Online or Exchange Online Protection subscription that, in turn, includes an Azure Rights Management subscription.<br \/>\nReference URL: <a href=\"https:\/\/docs.microsoft.com\/en-us\/office365\/securitycompliance\/ome\">https:\/\/docs.microsoft.com\/en-us\/office365\/securitycompliance\/ome<\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><strong>9. Use S\/MIME Protocol to Secure Connection to the Server and Prevent Data Interception<\/strong><\/h3>\n<p>Unlike message encryption, which is based on policies defined by an administrator, S\/MIME is controlled by the end user, who decides whether to use it. While message encryption is browser-based, and requires no client software or certificates, S\/MIME uses certificates to digitally sign and optionally encrypt the email content itself. Digitally signing the email ensures that the message content is what the sender originally wrote, and that the message hasn\u2019t been altered or tampered with. S\/MIME requires users to access their email through a client like Outlook, not a web browser.<br \/>\nReference URL: <a href=\"https:\/\/docs.microsoft.com\/en-us\/office365\/securitycompliance\/email-encryption\">https:\/\/docs.microsoft.com\/en-us\/office365\/securitycompliance\/email-encryption<\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><strong>10. Mobile Device Management (MDM)<\/strong><\/h3>\n<p>Office 365 has built in mobile device management that is available for both Office 365 for Business and<br \/>\nOffice 365 Enterprise. If employees use company-owned devices, admins are able to manage and<br \/>\nrevoke access to important data when needed.<br \/>\nReference URL: <a href=\"https:\/\/support.office.com\/en-us\/article\/set-up-mobile-device-management-mdm-inoffice-365-dd892318-bc44-4eb1-af00-9db5430be3cd\">https:\/\/support.office.com\/en-us\/article\/set-up-mobile-device-management-mdm-inoffice-365-dd892318-bc44-4eb1-af00-9db5430be3cd<\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><strong>11. Office Client Deployment<\/strong><\/h3>\n<p>Office client deployment keeps client versions of Office up to date through the latest security updates.<br \/>\nThere is a lot of flexibility regarding updates, for example; can opt in to feature and bug fixes quarterly.<br \/>\nAlso control the Office deployments using an XML-based deployment process called Click2Run (available on Office 365 Pro Plus plans only).<br \/>\nReference URL: <a href=\"https:\/\/docs.microsoft.com\/en-us\/deployoffice\/overview-of-the-office-2016-deployment-tool\">https:\/\/docs.microsoft.com\/en-us\/deployoffice\/overview-of-the-office-2016-deployment-tool<\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><strong>12. Sharing Content<\/strong><\/h3>\n<p>The admin portal offers the option to enable or disable content sharing which allows the admin to turn<br \/>\nsharing on or off for different apps within Office 365, including Sites, Calendar, Skype for Business and<br \/>\nIntegrated Apps. Reports are available that show what has been shared with whom, and admin can<br \/>\nrevoke sharing directly from the admin center without needing to go directly into the app\u2019s settings.<br \/>\nReference URL: <a href=\"https:\/\/support.office.com\/en-us\/article\/manage-sharing-with-external-users-in-office-365-small-business-2951a85f-c970-4375-aa4f-6b0d7035fe35\">https:\/\/support.office.com\/en-us\/article\/manage-sharing-with-external-users-in-office-365-small-business-2951a85f-c970-4375-aa4f-6b0d7035fe35<\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><strong>13. Use Office 365 Secure Score and Compare Security<\/strong><\/h3>\n<p>Secure Score is a security analytics tool that recommends on what can do to further reduce risk. Secure<br \/>\nScore looks at the Office 365 settings and activities and compares them to a baseline established by<br \/>\nMicrosoft. A score is then provided based on the settings and is re-evaluated in an on-going basis.<br \/>\nNote: Settings should be carefully reviewed and exceptions may need to be made to not disrupt mail<br \/>\nflow for legitimate emails which are being spoofed intentionally.<br \/>\nReference URL: https:\/\/docs.microsoft.com\/en-us\/office365\/securitycompliance\/office-365-securescore<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>14. Enable Mailbox Auditing<\/strong><\/h3>\n<p>In Office 365, administrators should enable mailbox audit logging to record mailbox access activity. By<br \/>\ndefault, mailbox auditing is disabled. Once audit logging is enabled, the audit log can be searched for<br \/>\nmailbox activity. Additionally, when mailbox audit logging is turned on, some actions performed by<br \/>\nadministrators, delegates, and owners are logged by default.<br \/>\nReference URL: https:\/\/docs.microsoft.com\/en-us\/office365\/securitycompliance\/enable-mailboxauditing<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>15. Configure DMARC and SPF Records to Validate Email<\/strong><\/h3>\n<p>Implementing DMARC (Domain-based Message Authentication, Reporting and Conformance) with SPF<br \/>\n(Sender Policy Framework) and DKIM (DomainKeys Identified Mail) is recommended. These features<br \/>\nprovide an additional layer of protection against spoofing and phishing emails. They can also help to<br \/>\nreduce the risk of business email compromise attacks. DMARC settings will tell the Exchange servers<br \/>\nwhat to do with messages that were transmitted with the organization\u2019s domain that fail SPF or DKIM<br \/>\nvalidation checks. A DMARC TXT Record also helps to prevent spoofing and phishing attacks by verifying the IP address of an email&#8217;s author against the alleged owner of the sending domain It is highly recommended the DMARC settings are reviewed and deployed with careful consideration such not to disrupt intended mail flow.<br \/>\nReference URL:https:\/\/docs.microsoft.com\/en-us\/office365\/securitycompliance\/use-dmarc-to-validateemail<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>16. Define Data Exfiltration Rule Restrictions<\/strong><\/h3>\n<p>Business email compromise can result in attackers configuring mailbox forwarding rules to send a copy<br \/>\nof email outside of the organization to a 3rd party email domain. Users may also desire to send copies of<br \/>\nemails to personal email accounts. These forwards reduce the overall security of the organization. A rule can be created in the Exchange Admin Center to reject any messages and include an explanation that client forwarding rules to external domains are not permitted. This rule can be defined if a message is sent \u2018outside the organization\u2019 and the message type is \u2018auto-forward\u2019 and the email is received from \u2018inside the organization.\u2019 It may also be beneficial to configure alert definitions based on these conditions to ensure an account was not compromised. An alert definition can be defined while creating the rule to email a notification to the defined contact upon triggering.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>17. Changing Anti-Spoofing Settings<\/strong><\/h3>\n<p>To create or update the (cross-domain) anti-spoofing settings, navigate to the Anti-phishing &gt; Antispoofing settings under the Threat Management &gt; Policy tab in the Security &amp; Compliance Center.<br \/>\nReference URL: https:\/\/docs.microsoft.com\/en-us\/office365\/securitycompliance\/anti-spoofingprotection<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>18. Use Office 365 Advanced Threat Protection<\/strong><\/h3>\n<p>Office 365 Advanced Threat Protection (ATP) helps to protect the organization from malicious attacks by scanning email attachments for malware with ATP Safe Attachments. It helps protect against unknown malware and viruses by providing robust zero-day protection and includes features to safeguard from harmful links in real time. It can perform the following tasks:<\/p>\n<ul>\n<li>Scanning web addresses (URLs) in email messages and Office documents with ATP Safe Links<\/li>\n<li>Identifying and blocking malicious files in online libraries with ATP for SharePoint, OneDrive, and<br \/>\nMicrosoft Teams<\/li>\n<li>Checking email messages for unauthorized spoofing with spoof intelligence<\/li>\n<li>Detecting when someone attempts to impersonate the users and organizations custom domains<br \/>\nwith ATP anti-phishing capabilities in Office 365<\/li>\n<\/ul>\n<p>Reference URL: <a href=\"https:\/\/docs.microsoft.com\/en-us\/office365\/securitycompliance\/office-365-atp\">https:\/\/docs.microsoft.com\/en-us\/office365\/securitycompliance\/office-365-atp<\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><strong>19. Zero-hour Auto Purge &#8211; Protection Against Spam and Malware<\/strong><\/h3>\n<p>Zero-hour auto purge (ZAP) is an email protection feature that detects messages with spam or malware<br \/>\nthat have already been delivered to the users&#8217; inboxes, and then renders the malicious content<br \/>\nharmless. How ZAP does this depends on the type of malicious content detected. ZAP is available with<br \/>\nthe default Exchange Online Protection that is included with any Office 365 subscription that contains<br \/>\nExchange Online mailboxes. ZAP continuously monitors updates to the Office 365 spam and malware<br \/>\nsignatures; therefore, it can find and remove previously delivered messages already in inboxes. For mail<br \/>\nthat was already identified as spam, ZAP moves unread messages to the user&#8217;s Junk mail folder. For<br \/>\nnewly detected malware, ZAP removes the attachments from the email message, regardless of whether<br \/>\nthe mail was read or not.<br \/>\nReference URL: <a href=\"https:\/\/docs.microsoft.com\/en-us\/office365\/securitycompliance\/zero-hour-auto-purge\">https:\/\/docs.microsoft.com\/en-us\/office365\/securitycompliance\/zero-hour-auto-purge<\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><strong>20. Create Organization-Wide Signatures and Disclaimers<\/strong><\/h3>\n<p>There is an option to add an email signature, legal disclaimer, or disclosure statement to the email<br \/>\nmessages that enter or leave the organization. Also, it is possible to set it up to apply to all incoming and<br \/>\noutgoing messages or can apply it to certain messages like those containing specific words or text.<br \/>\nReference URL: https:\/\/docs.microsoft.com\/en-us\/office365\/admin\/setup\/create-signatures-anddisclaimers?view=o365-worldwide<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>21. Configure Message Size Limit and Restrict Attachment Type for a Mailbox<\/strong><\/h3>\n<p>The default Office 365 maximum message size for messages is 25MB. It is recommended to change the<br \/>\nmaximum message size for an individual mailbox with Office 365 Admin Center or PowerShell according to the business needs. Restrict the users to attached except doc, pdf, xlxs etc. as per the business requirement<br \/>\nReference URL: https:\/\/docs.microsoft.com\/en-us\/exchange\/recipients\/user-mailboxes\/mailboxmessage-size-limits?view=exchserver-2019<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>22. Other Ways to Manage Spoofing and Phishing with Office 365<\/strong><\/h3>\n<p>Here are related ways to check on senders spoofing domain and help prevent them from damaging the<br \/>\norganization:<\/p>\n<ul>\n<li>\u00a0Check the Exchange Online Protection spoof mail report as part of the routine. Use this report<br \/>\noften to view and help manage spoofed senders.<\/li>\n<li>Review the Sender Policy Framework (SPF) configuration.<\/li>\n<li>Review the DomainKeys Identified Mail (DKIM) configuration. Use DKIM in addition to SPF and<br \/>\nDMARC to help prevent receiving messages that look like they are coming from the<br \/>\norganization\u2019s domain.<\/li>\n<li>Use the Get-PhishFilterPolicy Windows PowerShell cmdlet to gather detailed data on spoofed<br \/>\nsenders, generate allow and block lists, and determine how to generate more comprehensive<br \/>\nSPF, DKIM, and DMARC DNS records without having the legitimate email get caught in external<br \/>\nspam filters.<\/li>\n<\/ul>\n<p>Reference URL&#8217;s: https:\/\/docs.microsoft.com\/en-us\/powershell\/module\/exchange\/advancedthreat-protection\/Get-PhishFilterPolicy?view=exchange-ps,<\/p>\n<p>https:\/\/docs.microsoft.com\/en-us\/office365\/securitycompliance\/set-up-spf-in-office-365-tohelp-prevent-spoofing<\/p>\n<p>&nbsp;<\/p>\n<p>Author,<\/p>\n<div><strong>Jinto T.K.<\/strong><\/div>\n<div>SOC Team<\/div>\n<p><em>Varutra Consulting Pvt. Ltd<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>Here are some best practices to harden office 365 and ensure your data remains protected. 1. Password Policy It is always recommended to use a&#8230;<\/p>\n","protected":false},"author":3,"featured_media":2833,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[259,277,284,273,274],"tags":[190,192,193,194,195,196,197,198,199,200],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.6.3 - aioseo.com -->\n\t\t<meta name=\"description\" content=\"If you&#039;re using Microsoft Office 365, then you must aware some best practices to harden office 365 for securing your data and stay protected from cyber risk.\" \/>\n\t\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t\t<link rel=\"canonical\" href=\"https:\/\/www.varutra.com\/varutravrt3\/best-practices-to-harden-office-365\/\" \/>\n\t\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.6.3\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Varutra Consulting\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Best Practices to Harden Office 365 and Stay Protected\" \/>\n\t\t<meta property=\"og:description\" content=\"If you&#039;re using Microsoft Office 365, then you must aware some best practices to harden office 365 for securing your data and stay protected from cyber risk.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.varutra.com\/varutravrt3\/best-practices-to-harden-office-365\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/01\/Office-365-1-wpp1596612564110.jpg\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/01\/Office-365-1-wpp1596612564110.jpg\" \/>\n\t\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t\t<meta property=\"article:section\" content=\"Authentication &amp; Authorization\" \/>\n\t\t<meta property=\"article:tag\" content=\"365\" \/>\n\t\t<meta property=\"article:tag\" content=\"general settings for office 365\" \/>\n\t\t<meta property=\"article:tag\" content=\"hardening\" \/>\n\t\t<meta property=\"article:tag\" content=\"hardening office 365\" \/>\n\t\t<meta property=\"article:tag\" content=\"office 365\" \/>\n\t\t<meta property=\"article:tag\" content=\"office 365 advisory\" \/>\n\t\t<meta property=\"article:tag\" content=\"office 365 best practices\" \/>\n\t\t<meta property=\"article:tag\" content=\"office 365 hardening\" \/>\n\t\t<meta property=\"article:tag\" content=\"office 365 settings\" \/>\n\t\t<meta property=\"article:tag\" content=\"secure office 365\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2019-01-21T10:26:43+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2023-04-05T08:28:56+00:00\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Best Practices to Harden Office 365 and Stay Protected\" \/>\n\t\t<meta name=\"twitter:description\" content=\"If you&#039;re using Microsoft Office 365, then you must aware some best practices to harden office 365 for securing your data and stay protected from cyber risk.\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/01\/Office-365-1-wpp1596612564110.jpg\" \/>\n\t\t<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t\t<meta name=\"twitter:data1\" content=\"kalpadmin\" \/>\n\t\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/best-practices-to-harden-office-365\\\/#article\",\"name\":\"Best Practices to Harden Office 365 and Stay Protected\",\"headline\":\"Best Practices to Harden Office 365\",\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/Office-365-1-wpp1596612564110.jpg\",\"width\":1200,\"height\":600,\"caption\":\"Office-365\"},\"datePublished\":\"2019-01-21T10:26:43+05:30\",\"dateModified\":\"2023-04-05T13:58:56+05:30\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/best-practices-to-harden-office-365\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/best-practices-to-harden-office-365\\\/#webpage\"},\"articleSection\":\"Authentication &amp; Authorization, Data Privacy, Encryption &amp; Cryptography, Security Best Practices, Security Hardening, 365, general settings for office 365, hardening, hardening office 365, office 365, office 365 advisory, office 365 best practices, office 365 hardening, office 365 settings, secure office 365\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/best-practices-to-harden-office-365\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"nextItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/best-practices-to-harden-office-365\\\/#listItem\"},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/best-practices-to-harden-office-365\\\/#listItem\",\"position\":2,\"name\":\"Best Practices to Harden Office 365\",\"previousItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\"}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\",\"name\":\"Varutra\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Varutra-Found-e1612984024606.jpg\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/best-practices-to-harden-office-365\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/best-practices-to-harden-office-365\\\/#organizationLogo\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/\",\"name\":\"kalpadmin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/best-practices-to-harden-office-365\\\/#authorImage\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d69b4bf504d3e2e3c6ad0c424e16bcb2?s=96&d=mm&r=g\",\"width\":96,\"height\":96,\"caption\":\"kalpadmin\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/best-practices-to-harden-office-365\\\/#webpage\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/best-practices-to-harden-office-365\\\/\",\"name\":\"Best Practices to Harden Office 365 and Stay Protected\",\"description\":\"If you're using Microsoft Office 365, then you must aware some best practices to harden office 365 for securing your data and stay protected from cyber risk.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/best-practices-to-harden-office-365\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/Office-365-1-wpp1596612564110.jpg\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/best-practices-to-harden-office-365\\\/#mainImage\",\"width\":1200,\"height\":600,\"caption\":\"Office-365\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/best-practices-to-harden-office-365\\\/#mainImage\"},\"datePublished\":\"2019-01-21T10:26:43+05:30\",\"dateModified\":\"2023-04-05T13:58:56+05:30\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"name\":\"Varutra Consulting\",\"description\":\"Secure your digital world with our Cybersecurity services.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Best Practices to Harden Office 365 and Stay Protected<\/title>\n\n","aioseo_head_json":{"title":"Best Practices to Harden Office 365 and Stay Protected","description":"If you're using Microsoft Office 365, then you must aware some best practices to harden office 365 for securing your data and stay protected from cyber risk.","canonical_url":"https:\/\/www.varutra.com\/varutravrt3\/best-practices-to-harden-office-365\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"og:locale":"en_US","og:site_name":"Varutra Consulting","og:type":"article","og:title":"Best Practices to Harden Office 365 and Stay Protected","og:description":"If you're using Microsoft Office 365, then you must aware some best practices to harden office 365 for securing your data and stay protected from cyber risk.","og:url":"https:\/\/www.varutra.com\/varutravrt3\/best-practices-to-harden-office-365\/","og:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/01\/Office-365-1-wpp1596612564110.jpg","og:image:secure_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/01\/Office-365-1-wpp1596612564110.jpg","og:image:width":"1200","og:image:height":"600","article:section":"Authentication &amp; Authorization","article:tag":["365","general settings for office 365","hardening","hardening office 365","office 365","office 365 advisory","office 365 best practices","office 365 hardening","office 365 settings","secure office 365"],"article:published_time":"2019-01-21T10:26:43+00:00","article:modified_time":"2023-04-05T08:28:56+00:00","twitter:card":"summary_large_image","twitter:title":"Best Practices to Harden Office 365 and Stay Protected","twitter:description":"If you're using Microsoft Office 365, then you must aware some best practices to harden office 365 for securing your data and stay protected from cyber risk.","twitter:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/01\/Office-365-1-wpp1596612564110.jpg","twitter:label1":"Written by","twitter:data1":"kalpadmin","twitter:label2":"Est. reading time","twitter:data2":"10 minutes","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.varutra.com\/varutravrt3\/best-practices-to-harden-office-365\/#article","name":"Best Practices to Harden Office 365 and Stay Protected","headline":"Best Practices to Harden Office 365","author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2019\/01\/Office-365-1-wpp1596612564110.jpg","width":1200,"height":600,"caption":"Office-365"},"datePublished":"2019-01-21T10:26:43+05:30","dateModified":"2023-04-05T13:58:56+05:30","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/best-practices-to-harden-office-365\/#webpage"},"isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/best-practices-to-harden-office-365\/#webpage"},"articleSection":"Authentication &amp; Authorization, Data Privacy, Encryption &amp; Cryptography, Security Best Practices, Security Hardening, 365, general settings for office 365, hardening, hardening office 365, office 365, office 365 advisory, office 365 best practices, office 365 hardening, office 365 settings, secure office 365"},{"@type":"BreadcrumbList","@id":"https:\/\/www.varutra.com\/varutravrt3\/best-practices-to-harden-office-365\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/#listItem","position":1,"name":"Home","item":"https:\/\/www.varutra.com\/varutravrt3\/","nextItem":"https:\/\/www.varutra.com\/varutravrt3\/best-practices-to-harden-office-365\/#listItem"},{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/best-practices-to-harden-office-365\/#listItem","position":2,"name":"Best Practices to Harden Office 365","previousItem":"https:\/\/www.varutra.com\/varutravrt3\/#listItem"}]},{"@type":"Organization","@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization","name":"Varutra","url":"https:\/\/www.varutra.com\/varutravrt3\/","logo":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/Varutra-Found-e1612984024606.jpg","@id":"https:\/\/www.varutra.com\/varutravrt3\/best-practices-to-harden-office-365\/#organizationLogo"},"image":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/best-practices-to-harden-office-365\/#organizationLogo"}},{"@type":"Person","@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author","url":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/","name":"kalpadmin","image":{"@type":"ImageObject","@id":"https:\/\/www.varutra.com\/varutravrt3\/best-practices-to-harden-office-365\/#authorImage","url":"https:\/\/secure.gravatar.com\/avatar\/d69b4bf504d3e2e3c6ad0c424e16bcb2?s=96&d=mm&r=g","width":96,"height":96,"caption":"kalpadmin"}},{"@type":"WebPage","@id":"https:\/\/www.varutra.com\/varutravrt3\/best-practices-to-harden-office-365\/#webpage","url":"https:\/\/www.varutra.com\/varutravrt3\/best-practices-to-harden-office-365\/","name":"Best Practices to Harden Office 365 and Stay Protected","description":"If you're using Microsoft Office 365, then you must aware some best practices to harden office 365 for securing your data and stay protected from cyber risk.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#website"},"breadcrumb":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/best-practices-to-harden-office-365\/#breadcrumblist"},"author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"creator":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2019\/01\/Office-365-1-wpp1596612564110.jpg","@id":"https:\/\/www.varutra.com\/varutravrt3\/best-practices-to-harden-office-365\/#mainImage","width":1200,"height":600,"caption":"Office-365"},"primaryImageOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/best-practices-to-harden-office-365\/#mainImage"},"datePublished":"2019-01-21T10:26:43+05:30","dateModified":"2023-04-05T13:58:56+05:30"},{"@type":"WebSite","@id":"https:\/\/www.varutra.com\/varutravrt3\/#website","url":"https:\/\/www.varutra.com\/varutravrt3\/","name":"Varutra Consulting","description":"Secure your digital world with our Cybersecurity services.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"}}]}},"aioseo_meta_data":{"post_id":"2349","title":"Best Practices to Harden Office 365 and Stay Protected","description":"If you're using Microsoft Office 365, then you must aware some best practices to harden office 365 for securing your data and stay protected from cyber risk.","keywords":[],"keyphrases":"{\"focus\":{\"keyphrase\":\"Harden Office 365\",\"score\":80,\"analysis\":{\"keyphraseInTitle\":{\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInDescription\":{\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"score\":9,\"maxScore\":9,\"error\":0,\"length\":2},\"keyphraseInURL\":{\"score\":5,\"maxScore\":5,\"error\":0},\"keyphraseInIntroduction\":{\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInSubHeadings\":{\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"score\":3,\"maxScore\":9,\"error\":1}}},\"additional\":[{\"keyphrase\":\"Best Practices to Harden Office 365\",\"score\":75,\"analysis\":{\"keyphraseInDescription\":{\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"score\":6,\"maxScore\":9,\"error\":1,\"length\":5},\"keyphraseInIntroduction\":{\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInImageAlt\":{\"score\":3,\"maxScore\":9,\"error\":1}}},{\"keyphrase\":\"Best Practices\",\"score\":83,\"analysis\":{\"keyphraseInDescription\":{\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"score\":9,\"maxScore\":9,\"error\":0,\"length\":2},\"keyphraseInIntroduction\":{\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInImageAlt\":{\"score\":3,\"maxScore\":9,\"error\":1}}}]}","primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"featured","og_image_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/01\/Office-365-1-wpp1596612564110.jpg","og_image_width":"1200","og_image_height":"600","og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":"Authentication &amp; Authorization","og_article_tags":[],"twitter_use_og":true,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"Article","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":"{\"article\":{\"articleType\":\"BlogPosting\"},\"course\":{\"name\":\"\",\"description\":\"\",\"provider\":\"\"},\"faq\":{\"pages\":[]},\"product\":{\"reviews\":[]},\"recipe\":{\"ingredients\":[],\"instructions\":[],\"keywords\":[]},\"software\":{\"reviews\":[],\"operatingSystems\":[]},\"webPage\":{\"webPageType\":\"WebPage\"}}","pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"limit_modified_date":false,"open_ai":null,"created":"2021-10-27 15:16:26","updated":"2023-04-05 08:39:50"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\/category\/authentication-authorization\/\" title=\"Authentication &amp; Authorization\">Authentication &amp; Authorization<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\tBest Practices to Harden Office 365\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.varutra.com\/varutravrt3"},{"label":"Authentication &amp; Authorization","link":"https:\/\/www.varutra.com\/varutravrt3\/category\/authentication-authorization\/"},{"label":"Best Practices to Harden Office 365","link":"https:\/\/www.varutra.com\/varutravrt3\/best-practices-to-harden-office-365\/"}],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/2349"}],"collection":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/comments?post=2349"}],"version-history":[{"count":7,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/2349\/revisions"}],"predecessor-version":[{"id":21340,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/2349\/revisions\/21340"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media\/2833"}],"wp:attachment":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media?parent=2349"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/categories?post=2349"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/tags?post=2349"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}