Best Practices for O365 Security

Know who logs in, when and from where.

Set up Password Policies and Multi-Factor Authentication (MFA)

In the Office 365 Admin Center, you can fortify your Azure AD security by setting up policies for strong passwords,
password expiry dates, and multi-factor authentication (MFA) for access to Office 365.

You should also continuously monitor user login activities to look for
signs of compromised user credentials.

Monitor All Azure AD User Sign-In Activities

When anomalous user sign-in activities occur, you need to know immediately so you can investigate the events and
stop a potential data breach in its tracks.

Establish a Policy of Least Privilege

Microsoft uses role-based access controls (RBAC) for admins, which you can manage from the
Office 365 Admin Center5.

In general, you should grant your admins the least amount of privilege as possible for them
to accomplish their work.

Monitor Office 365 Administrator Audit Logs

you should monitor all administrator activities with the administrative
audit log feature in Office 365.

Office 365 audit logs can also be connected to your existing SIEM or unified security management tool if it supports the Office 365 Management Activity API

Monitor All User Activities in SharePoint and OneDrive

It’s important to monitor all user access and activities (delete, upload, edit, restore, etc.) to the business-critical data
stored in your SharePoint and OneDrive.

By establishing a baseline of user activities, you can detect anomalies
that warrant investigation.

Monitor File Activities involving Known Bad Actors

A third-party security monitoring solution with integrated threat intelligence goes beyond the built-in features in Office
365 to detect file activities involving known bad actors.

For example, multiple file uploads with known ransomware
extensions such as ‘.encrypt’ can alert you to a ransomware attack, so that you can take immediate action to isolate
the environment.

Are you ready to get peace of mind?

Using Security Best Practices, MRE has designed an environment where all information transmitted between employees, agents and clients is kept secure, and where malware and phishing attempts are being stopped before reaching the members of the organization.

Why You Should Consider a Third-Party Security Monitoring Tool for Office 365

While Microsoft provides many tools, capabilities, and resources for security and compliance, finding where to
provision, configure and then use each service can be tremendously challenging.

Even after you have set up your Office 365 policies and alerts, do you have confidence that you have configured
everything correctly, that the configurations will point you to the right threats, and that they will continue to do so as
threats evolve? A dedicated security monitoring solution can provide an additional layer of security assurance and
critical threat detection capabilities for your Office 365 environment, including pre-built rules, alarms, and analytics

These attacks bypass traditional secure email gateways and end up costing organizations time, money, and brand equity.

Email is the top threat vector for ransomware and other advanced threats. You need to ensure that your business data and users are protected from advanced and constantly evolving security threats. This requires a layer of security beyond the standard Exchange Online Protection (EOP).


Barracuda Essentials for Office 365

Barracuda offers two cloud-based services that protect all your business email in Office 365 with zero impact on email performance. Barracuda Essentials for Office 365 is a comprehensive email security suite that filters every inbound and outbound email to stop spam, viruses, data leaks, and malware. Barracuda Sentinel goes a step further to use an AI engine to inspect all the emails already in your in box to block against impersonation-based fraud such as phishing. Together, they provide the industry’s best and most cost-effective protection for Office 365 users.

Get the industry’s best protection against socially engineered business email attacks, fraud, account takeover, and brand hijacking.
Use integrated intelligent training and simulation to turn your people into another line of defense against phishing—even on personal accounts.
The full portfolio of data protection capabilities provides resiliency, and easy recovery from ransomware and accidental data loss.

Scan Office 365 for threats today