{"id":57505,"date":"2026-04-29T18:52:01","date_gmt":"2026-04-29T08:52:01","guid":{"rendered":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/29\/the-first-10-things-we-check-in-a-microsoft-365-security-review\/"},"modified":"2026-04-29T18:53:55","modified_gmt":"2026-04-29T08:53:55","slug":"the-first-10-things-we-check-in-a-microsoft-365-security-review","status":"publish","type":"post","link":"https:\/\/cloudproinc.com.au\/index.php\/2026\/04\/29\/the-first-10-things-we-check-in-a-microsoft-365-security-review\/","title":{"rendered":"The First 10 Things We Check in a Microsoft 365 Security Review"},"content":{"rendered":"\n<p>When our team starts a Microsoft 365 security review, we focus on the areas that quickly tell us whether an environment is well controlled, loosely managed, or quietly carrying avoidable risk.<\/p>\n\n\n\n<p>For many Australian organisations, Microsoft 365 has become the centre of daily work. Email, files, Teams, devices, identities, and security alerts all sit inside the same ecosystem. That convenience is powerful, but it also means a small configuration gap can create a much larger business risk.<\/p>\n\n\n\n<p>A Microsoft 365 security review is not about ticking every possible control in a portal. It is about understanding how people sign in, how data moves, how devices are managed, and whether the organisation can spot and respond to suspicious activity before it becomes a business incident.<\/p>\n\n\n\n<p>Here are the first 10 areas we usually check.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">1. Global Administrator Accounts<\/h2>\n\n\n\n<p>The first place we look is privileged access. Global administrator accounts can change almost anything in Microsoft 365, so they deserve special treatment.<\/p>\n\n\n\n<p>We check how many global admins exist, whether they are active day-to-day accounts, whether they use strong authentication, and whether there are stale accounts that should have been removed. In many mid-market environments, admin access has grown over time because it was convenient during a project or support issue.<\/p>\n\n\n\n<p>The business risk is simple. If an attacker compromises one overpowered account, they may be able to access mailboxes, change security settings, create persistence, or disable protections before anyone notices.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">2. Multi-Factor Authentication Coverage<\/h2>\n\n\n\n<p>Multi-factor authentication, or MFA, adds an extra proof of identity beyond a password. It is one of the most effective controls against account takeover, but only when it is applied consistently.<\/p>\n\n\n\n<p>We check whether MFA is enforced for all users, all administrators, and all remote access scenarios. We also look for exceptions, legacy authentication, break-glass accounts, and users who are technically registered but not actually protected in the right way.<\/p>\n\n\n\n<p>This aligns closely with the Essential 8, the Australian government&#8217;s cybersecurity framework that many organisations use as a baseline for practical security maturity.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">3. Conditional Access Policies<\/h2>\n\n\n\n<p>Conditional Access is the Microsoft 365 control that decides when a sign-in should be allowed, blocked, or challenged. It can consider location, device health, application, user risk, and other signals.<\/p>\n\n\n\n<p>We check whether the organisation has sensible policies for administrators, external access, unmanaged devices, risky sign-ins, and high-impact apps such as Exchange Online and SharePoint. We also check whether policies are too loose, too complicated, or sitting in report-only mode without being enforced.<\/p>\n\n\n\n<p>Good Conditional Access reduces risk without making work painful. Poorly designed policies either leave the door open or frustrate staff until exceptions become the norm.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">4. Legacy Authentication<\/h2>\n\n\n\n<p>Legacy authentication refers to older sign-in methods that do not properly support modern security controls such as MFA. Attackers still look for it because it can provide a way around otherwise strong identity protection.<\/p>\n\n\n\n<p>We check whether protocols such as basic authentication, old mail clients, or outdated app connections are still allowed. Even when Microsoft has disabled many legacy paths by default, inherited configurations and third-party integrations can still create exposure.<\/p>\n\n\n\n<p>For a business, this is one of the faster wins. Removing old authentication paths can significantly reduce account takeover risk without changing how most staff work.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">5. Mailbox and Email Security Settings<\/h2>\n\n\n\n<p>Email remains one of the most common entry points for phishing, invoice fraud, and malware. A Microsoft 365 security review needs to look beyond whether email is simply flowing.<\/p>\n\n\n\n<p>We check anti-phishing policies, spoofing protection, safe links, safe attachments, quarantine handling, external sender warnings, forwarding rules, and suspicious inbox rules. We also check whether executives, finance teams, and high-risk roles have stronger protection.<\/p>\n\n\n\n<p>The business outcome is direct. Better email controls reduce the chance of a staff member approving a fake payment, opening a malicious file, or handing credentials to an attacker.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">6. Secure Score and Defender Recommendations<\/h2>\n\n\n\n<p>Microsoft Secure Score gives a useful view of security configuration gaps across Microsoft 365. It is not a perfect measurement of security maturity, but it is a good way to identify practical improvements.<\/p>\n\n\n\n<p>We review Secure Score and Microsoft Defender recommendations to separate useful actions from noise. Some recommendations can be applied quickly. Others need discussion because they may affect users, apps, or business processes.<\/p>\n\n\n\n<p>The goal is not to chase a perfect score. The goal is to understand which improvements reduce meaningful risk for the organisation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">7. Device Compliance and Intune Management<\/h2>\n\n\n\n<p>Microsoft Intune manages and secures company devices such as laptops, desktops, and mobile phones. Device controls matter because a secure identity is much weaker when the device being used is unmanaged, unpatched, or shared.<\/p>\n\n\n\n<p>We check whether devices are enrolled, compliant, encrypted, patched, and protected with endpoint security baselines. We also look at bring-your-own-device access, local administrator rights, and whether staff can access company data from unmanaged machines.<\/p>\n\n\n\n<p>For many organisations, this is where Microsoft 365 security becomes operational. Identity policies and device policies need to work together, otherwise sensitive data can still land on risky endpoints.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">8. SharePoint and OneDrive Sharing<\/h2>\n\n\n\n<p>SharePoint and OneDrive make collaboration easy, but sharing settings can quietly expand over time. External links, anonymous access, unmanaged guests, and broad permissions can expose sensitive information without anyone intending to do the wrong thing.<\/p>\n\n\n\n<p>We check tenant-wide sharing settings, site-level permissions, guest access, anonymous links, link expiry, and whether sensitive sites have stronger controls. We also look for data that should not be shared broadly, especially documents containing personal information or commercial records.<\/p>\n\n\n\n<p>This matters under Australian privacy expectations. If customer or employee information is exposed through oversharing, the issue is not just technical. It becomes a governance, legal, and reputational problem.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">9. Audit Logging and Alert Visibility<\/h2>\n\n\n\n<p>Security controls are only useful if the organisation can see what is happening. Audit logging and alerts help teams investigate suspicious sign-ins, mailbox access, admin changes, file sharing, and policy modifications.<\/p>\n\n\n\n<p>We check whether audit logging is enabled, whether alerts are being reviewed, who receives notifications, and whether Microsoft Defender incidents are actually being triaged. In smaller IT teams, alerts often exist but no one has a clear process for action.<\/p>\n\n\n\n<p>A good review should answer one uncomfortable question. If a compromised account was used last night, would the organisation know today?<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">10. Licensing and Security Capability Gaps<\/h2>\n\n\n\n<p>Microsoft 365 security depends partly on configuration and partly on licensing. Some organisations are paying for advanced features they have never enabled. Others assume they have controls that are not included in their current plan.<\/p>\n\n\n\n<p>We check the licences in use, the security features available, and the gaps between business risk and current capability. This includes areas such as Defender for Office 365, Entra ID capabilities, Intune, Purview, and advanced audit features.<\/p>\n\n\n\n<p>The aim is not to spend more by default. The aim is to make sure the organisation understands what it already owns, what is missing, and where licensing changes would genuinely reduce risk.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A Practical Review Should Lead to Decisions<\/h2>\n\n\n\n<p>A Microsoft 365 security review should not end with a long spreadsheet that nobody has time to action. It should create a prioritised plan that separates urgent risks, quick wins, operational improvements, and longer-term governance work.<\/p>\n\n\n\n<p>For a 50 to 500 person organisation, the best outcome is clarity. Which issues create the highest business risk? Which controls can be fixed this month? Which changes need communication because they affect staff? Which risks should be accepted, and by whom?<\/p>\n\n\n\n<p>That is where security becomes useful to the business. It moves from portal settings to better decisions.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Bottom Line<\/h2>\n\n\n\n<p>Microsoft 365 is often secure enough to support a strong operating model, but only when it is configured deliberately. Default settings, inherited exceptions, unmanaged devices, and unclear ownership can quietly build risk over time.<\/p>\n\n\n\n<p>Our team helps Australian organisations review Microsoft 365 environments against practical security priorities, including Essential 8 expectations, identity protection, device management, and data governance. If you are not sure whether your tenant is as secure as it should be, we are happy to take a look and help you identify the first risks worth fixing.<\/p>\n\n\n","protected":false},"excerpt":{"rendered":"<p>When our team starts a Microsoft 365 security review, we focus on the areas that quickly tell us whether an environment is well controlled, loosely managed, or quietly carrying avoidable risk. For many Australian organisations, Microsoft 365 has become the centre of daily work. Email, files, Teams, devices, identities, and security alerts all sit inside [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":57507,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_yoast_wpseo_focuskw":"Microsoft 365 security review","_yoast_wpseo_title":"The First 10 Things in a Microsoft 365 Security Review","_yoast_wpseo_metadesc":"A Microsoft 365 security review reveals hidden risk fast. Here are the first 10 areas we check in mid-market Australian tenants, from MFA to Intune.","_yoast_wpseo_opengraph-title":"The First 10 Things We Check in a Microsoft 365 Security Review","_yoast_wpseo_opengraph-description":"A Microsoft 365 security review reveals hidden risk fast. Here are the first 10 areas we check in mid-market Australian tenants, from MFA to Intune.","_yoast_wpseo_twitter-title":"The First 10 Things We Check in a Microsoft 365 Security Review","_yoast_wpseo_twitter-description":"A Microsoft 365 security review reveals hidden risk fast. Here are the first 10 areas we check in mid-market Australian tenants, from MFA to Intune.","_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[13,127,107,14],"tags":[],"class_list":["post-57505","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-cloud-security","category-cybersecurity","category-microsoft-365"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The First 10 Things in a Microsoft 365 Security Review<\/title>\n<meta name=\"description\" content=\"A Microsoft 365 security review reveals hidden risk fast. Here are the first 10 areas we check in mid-market Australian tenants, from MFA to Intune.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/29\/the-first-10-things-we-check-in-a-microsoft-365-security-review\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The First 10 Things We Check in a Microsoft 365 Security Review\" \/>\n<meta property=\"og:description\" content=\"A Microsoft 365 security review reveals hidden risk fast. Here are the first 10 areas we check in mid-market Australian tenants, from MFA to Intune.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/29\/the-first-10-things-we-check-in-a-microsoft-365-security-review\/\" \/>\n<meta property=\"og:site_name\" content=\"CPI Consulting\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-29T08:52:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-29T08:53:55+00:00\" \/>\n<meta name=\"author\" content=\"CPI Staff\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"The First 10 Things We Check in a Microsoft 365 Security Review\" \/>\n<meta name=\"twitter:description\" content=\"A Microsoft 365 security review reveals hidden risk fast. Here are the first 10 areas we check in mid-market Australian tenants, from MFA to Intune.\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"CPI Staff\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/29\\\/the-first-10-things-we-check-in-a-microsoft-365-security-review\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/29\\\/the-first-10-things-we-check-in-a-microsoft-365-security-review\\\/\"},\"author\":{\"name\":\"CPI Staff\",\"@id\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/#\\\/schema\\\/person\\\/192eeeb0ce91062126ce3822ae88fe6e\"},\"headline\":\"The First 10 Things We Check in a Microsoft 365 Security Review\",\"datePublished\":\"2026-04-29T08:52:01+00:00\",\"dateModified\":\"2026-04-29T08:53:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/29\\\/the-first-10-things-we-check-in-a-microsoft-365-security-review\\\/\"},\"wordCount\":1326,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/29\\\/the-first-10-things-we-check-in-a-microsoft-365-security-review\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/the-first-10-things-we-check-in-a-microsoft-365-security-review-cover.png\",\"articleSection\":[\"Blog\",\"Cloud Security\",\"Cybersecurity\",\"Microsoft 365\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/29\\\/the-first-10-things-we-check-in-a-microsoft-365-security-review\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/29\\\/the-first-10-things-we-check-in-a-microsoft-365-security-review\\\/\",\"url\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/29\\\/the-first-10-things-we-check-in-a-microsoft-365-security-review\\\/\",\"name\":\"The First 10 Things in a Microsoft 365 Security Review\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/29\\\/the-first-10-things-we-check-in-a-microsoft-365-security-review\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/29\\\/the-first-10-things-we-check-in-a-microsoft-365-security-review\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/the-first-10-things-we-check-in-a-microsoft-365-security-review-cover.png\",\"datePublished\":\"2026-04-29T08:52:01+00:00\",\"dateModified\":\"2026-04-29T08:53:55+00:00\",\"description\":\"A Microsoft 365 security review reveals hidden risk fast. Here are the first 10 areas we check in mid-market Australian tenants, from MFA to Intune.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/29\\\/the-first-10-things-we-check-in-a-microsoft-365-security-review\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/29\\\/the-first-10-things-we-check-in-a-microsoft-365-security-review\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/29\\\/the-first-10-things-we-check-in-a-microsoft-365-security-review\\\/#primaryimage\",\"url\":\"\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/the-first-10-things-we-check-in-a-microsoft-365-security-review-cover.png\",\"contentUrl\":\"\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/the-first-10-things-we-check-in-a-microsoft-365-security-review-cover.png\",\"width\":1536,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/29\\\/the-first-10-things-we-check-in-a-microsoft-365-security-review\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cloudproinc.com.au\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The First 10 Things We Check in a Microsoft 365 Security Review\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/#website\",\"url\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/\",\"name\":\"Cloud Pro Inc - CPI Consulting Pty Ltd\",\"description\":\"Cloud, AI &amp; Cybersecurity Consulting | Melbourne\",\"publisher\":{\"@id\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/#organization\",\"name\":\"Cloud Pro Inc - Cloud Pro Inc - CPI Consulting Pty Ltd\",\"url\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/favfinalfile.png\",\"contentUrl\":\"\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/favfinalfile.png\",\"width\":500,\"height\":500,\"caption\":\"Cloud Pro Inc - Cloud Pro Inc - CPI Consulting Pty Ltd\"},\"image\":{\"@id\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/#\\\/schema\\\/person\\\/192eeeb0ce91062126ce3822ae88fe6e\",\"name\":\"CPI Staff\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g\",\"caption\":\"CPI Staff\"},\"sameAs\":[\"http:\\\/\\\/www.cloudproinc.com.au\"],\"url\":\"https:\\\/\\\/cloudproinc.com.au\\\/index.php\\\/author\\\/cpiadmin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The First 10 Things in a Microsoft 365 Security Review","description":"A Microsoft 365 security review reveals hidden risk fast. Here are the first 10 areas we check in mid-market Australian tenants, from MFA to Intune.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/29\/the-first-10-things-we-check-in-a-microsoft-365-security-review\/","og_locale":"en_US","og_type":"article","og_title":"The First 10 Things We Check in a Microsoft 365 Security Review","og_description":"A Microsoft 365 security review reveals hidden risk fast. Here are the first 10 areas we check in mid-market Australian tenants, from MFA to Intune.","og_url":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/29\/the-first-10-things-we-check-in-a-microsoft-365-security-review\/","og_site_name":"CPI Consulting","article_published_time":"2026-04-29T08:52:01+00:00","article_modified_time":"2026-04-29T08:53:55+00:00","author":"CPI Staff","twitter_card":"summary_large_image","twitter_title":"The First 10 Things We Check in a Microsoft 365 Security Review","twitter_description":"A Microsoft 365 security review reveals hidden risk fast. Here are the first 10 areas we check in mid-market Australian tenants, from MFA to Intune.","twitter_misc":{"Written by":"CPI Staff","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/29\/the-first-10-things-we-check-in-a-microsoft-365-security-review\/#article","isPartOf":{"@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/29\/the-first-10-things-we-check-in-a-microsoft-365-security-review\/"},"author":{"name":"CPI Staff","@id":"https:\/\/cloudproinc.azurewebsites.net\/#\/schema\/person\/192eeeb0ce91062126ce3822ae88fe6e"},"headline":"The First 10 Things We Check in a Microsoft 365 Security Review","datePublished":"2026-04-29T08:52:01+00:00","dateModified":"2026-04-29T08:53:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/29\/the-first-10-things-we-check-in-a-microsoft-365-security-review\/"},"wordCount":1326,"commentCount":0,"publisher":{"@id":"https:\/\/cloudproinc.azurewebsites.net\/#organization"},"image":{"@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/29\/the-first-10-things-we-check-in-a-microsoft-365-security-review\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2026\/04\/the-first-10-things-we-check-in-a-microsoft-365-security-review-cover.png","articleSection":["Blog","Cloud Security","Cybersecurity","Microsoft 365"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/29\/the-first-10-things-we-check-in-a-microsoft-365-security-review\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/29\/the-first-10-things-we-check-in-a-microsoft-365-security-review\/","url":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/29\/the-first-10-things-we-check-in-a-microsoft-365-security-review\/","name":"The First 10 Things in a Microsoft 365 Security Review","isPartOf":{"@id":"https:\/\/cloudproinc.azurewebsites.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/29\/the-first-10-things-we-check-in-a-microsoft-365-security-review\/#primaryimage"},"image":{"@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/29\/the-first-10-things-we-check-in-a-microsoft-365-security-review\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2026\/04\/the-first-10-things-we-check-in-a-microsoft-365-security-review-cover.png","datePublished":"2026-04-29T08:52:01+00:00","dateModified":"2026-04-29T08:53:55+00:00","description":"A Microsoft 365 security review reveals hidden risk fast. Here are the first 10 areas we check in mid-market Australian tenants, from MFA to Intune.","breadcrumb":{"@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/29\/the-first-10-things-we-check-in-a-microsoft-365-security-review\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/29\/the-first-10-things-we-check-in-a-microsoft-365-security-review\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/29\/the-first-10-things-we-check-in-a-microsoft-365-security-review\/#primaryimage","url":"\/wp-content\/uploads\/2026\/04\/the-first-10-things-we-check-in-a-microsoft-365-security-review-cover.png","contentUrl":"\/wp-content\/uploads\/2026\/04\/the-first-10-things-we-check-in-a-microsoft-365-security-review-cover.png","width":1536,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/29\/the-first-10-things-we-check-in-a-microsoft-365-security-review\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cloudproinc.com.au\/"},{"@type":"ListItem","position":2,"name":"The First 10 Things We Check in a Microsoft 365 Security Review"}]},{"@type":"WebSite","@id":"https:\/\/cloudproinc.azurewebsites.net\/#website","url":"https:\/\/cloudproinc.azurewebsites.net\/","name":"Cloud Pro Inc - CPI Consulting Pty Ltd","description":"Cloud, AI &amp; Cybersecurity Consulting | Melbourne","publisher":{"@id":"https:\/\/cloudproinc.azurewebsites.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cloudproinc.azurewebsites.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cloudproinc.azurewebsites.net\/#organization","name":"Cloud Pro Inc - Cloud Pro Inc - CPI Consulting Pty Ltd","url":"https:\/\/cloudproinc.azurewebsites.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cloudproinc.azurewebsites.net\/#\/schema\/logo\/image\/","url":"\/wp-content\/uploads\/2022\/01\/favfinalfile.png","contentUrl":"\/wp-content\/uploads\/2022\/01\/favfinalfile.png","width":500,"height":500,"caption":"Cloud Pro Inc - Cloud Pro Inc - CPI Consulting Pty Ltd"},"image":{"@id":"https:\/\/cloudproinc.azurewebsites.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/cloudproinc.azurewebsites.net\/#\/schema\/person\/192eeeb0ce91062126ce3822ae88fe6e","name":"CPI Staff","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g","caption":"CPI Staff"},"sameAs":["http:\/\/www.cloudproinc.com.au"],"url":"https:\/\/cloudproinc.com.au\/index.php\/author\/cpiadmin\/"}]}},"jetpack_featured_media_url":"\/wp-content\/uploads\/2026\/04\/the-first-10-things-we-check-in-a-microsoft-365-security-review-cover.png","jetpack-related-posts":[{"id":382,"url":"https:\/\/cloudproinc.com.au\/index.php\/2024\/07\/15\/how-to-prevent-microsoft-365-emails-from-blacklisting\/","url_meta":{"origin":57505,"position":0},"title":"How to Prevent Microsoft 365 Emails from Blacklisting","author":"CPI Staff","date":"July 15, 2024","format":false,"excerpt":"In this Microsoft 365 Email Security article, we will explain how to prevent Microsoft 365 emails from blacklisting. As an IT consultancy in the Microsoft 365 space, we help Microsoft 365 customers that get affected by anti-spam systems that blacklist and graylist their email domains as spam. Once a domain\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/cloudproinc.com.au\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2024\/07\/Pretect-your-M365-emails.webp","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2024\/07\/Pretect-your-M365-emails.webp 1x, \/wp-content\/uploads\/2024\/07\/Pretect-your-M365-emails.webp 1.5x, \/wp-content\/uploads\/2024\/07\/Pretect-your-M365-emails.webp 2x, \/wp-content\/uploads\/2024\/07\/Pretect-your-M365-emails.webp 3x, \/wp-content\/uploads\/2024\/07\/Pretect-your-M365-emails.webp 4x"},"classes":[]},{"id":57219,"url":"https:\/\/cloudproinc.com.au\/index.php\/2026\/03\/11\/what-agent-365-and-microsoft-365-e7-mean-for-secure-ai-adoption\/","url_meta":{"origin":57505,"position":1},"title":"What Agent 365 and Microsoft 365 E7 Mean for Secure AI Adoption","author":"CPI Staff","date":"March 11, 2026","format":false,"excerpt":"Microsoft\u2019s latest AI and security moves point to a better way to adopt AI at work: make it useful for staff, visible to IT, and governed from day one.","rel":"","context":"In &quot;Agent 365&quot;","block_context":{"text":"Agent 365","link":"https:\/\/cloudproinc.com.au\/index.php\/category\/agent-365\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2026\/03\/post-12.png","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2026\/03\/post-12.png 1x, \/wp-content\/uploads\/2026\/03\/post-12.png 1.5x, \/wp-content\/uploads\/2026\/03\/post-12.png 2x, \/wp-content\/uploads\/2026\/03\/post-12.png 3x, \/wp-content\/uploads\/2026\/03\/post-12.png 4x"},"classes":[]},{"id":57028,"url":"https:\/\/cloudproinc.com.au\/index.php\/2026\/02\/16\/why-your-microsoft-365-licensing-is-probably-costing-you-more-than-it-should\/","url_meta":{"origin":57505,"position":2},"title":"Why Your Microsoft 365 Licensing Is Probably Costing You More Than It Should","author":"CPI Staff","date":"February 16, 2026","format":false,"excerpt":"Most businesses overpay for Microsoft 365 because of small licensing mismatches that add up fast. Here\u2019s a practical way to cut waste, reduce risk, and align licences to how people actually work.","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/cloudproinc.com.au\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2026\/02\/post-22.png","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2026\/02\/post-22.png 1x, \/wp-content\/uploads\/2026\/02\/post-22.png 1.5x, \/wp-content\/uploads\/2026\/02\/post-22.png 2x, \/wp-content\/uploads\/2026\/02\/post-22.png 3x, \/wp-content\/uploads\/2026\/02\/post-22.png 4x"},"classes":[]},{"id":57032,"url":"https:\/\/cloudproinc.com.au\/index.php\/2026\/02\/16\/the-3-biggest-security-gaps-i-see-in-mid-size-australian-businesses\/","url_meta":{"origin":57505,"position":3},"title":"The 3 Biggest Security Gaps I See in Mid-Size Australian Businesses","author":"CPI Staff","date":"February 16, 2026","format":false,"excerpt":"Most breaches in mid-size businesses don\u2019t happen because of \u201celite hackers\u201d. They happen because of a few predictable gaps. Here are the three I see most often\u2014and how to close them fast.","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/cloudproinc.com.au\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2026\/02\/post-23.png","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2026\/02\/post-23.png 1x, \/wp-content\/uploads\/2026\/02\/post-23.png 1.5x, \/wp-content\/uploads\/2026\/02\/post-23.png 2x, \/wp-content\/uploads\/2026\/02\/post-23.png 3x, \/wp-content\/uploads\/2026\/02\/post-23.png 4x"},"classes":[]},{"id":469,"url":"https:\/\/cloudproinc.com.au\/index.php\/2024\/07\/29\/recover-deleted-or-lost-exchange-online-emails-to-pst\/","url_meta":{"origin":57505,"position":4},"title":"Recover Deleted or Lost Exchange Online Emails to PST","author":"CPI Staff","date":"July 29, 2024","format":false,"excerpt":"In this Exchange Online and Microsoft Purview article, we will show how to Recover Deleted or Lost Exchange Online Emails to PST. As a consulting company, we help many organisations comply with regulatory requirements like data retention documents, chat history, and emails. In the last two years, the Microsoft 365\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/cloudproinc.com.au\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2024\/07\/How-to-Recover-Deleted-or-Lost-Exchange-Online-Emails-to-PST.webp","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2024\/07\/How-to-Recover-Deleted-or-Lost-Exchange-Online-Emails-to-PST.webp 1x, \/wp-content\/uploads\/2024\/07\/How-to-Recover-Deleted-or-Lost-Exchange-Online-Emails-to-PST.webp 1.5x, \/wp-content\/uploads\/2024\/07\/How-to-Recover-Deleted-or-Lost-Exchange-Online-Emails-to-PST.webp 2x, \/wp-content\/uploads\/2024\/07\/How-to-Recover-Deleted-or-Lost-Exchange-Online-Emails-to-PST.webp 3x, \/wp-content\/uploads\/2024\/07\/How-to-Recover-Deleted-or-Lost-Exchange-Online-Emails-to-PST.webp 4x"},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/posts\/57505","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/comments?post=57505"}],"version-history":[{"count":1,"href":"https:\/\/cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/posts\/57505\/revisions"}],"predecessor-version":[{"id":57506,"href":"https:\/\/cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/posts\/57505\/revisions\/57506"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/media\/57507"}],"wp:attachment":[{"href":"https:\/\/cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/media?parent=57505"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/categories?post=57505"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/tags?post=57505"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}