{"id":57511,"date":"2026-04-30T16:47:00","date_gmt":"2026-04-30T06:47:00","guid":{"rendered":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/30\/the-microsoft-365-tenant-looked-fine-until-we-checked-the-security-defaults\/"},"modified":"2026-04-30T16:49:25","modified_gmt":"2026-04-30T06:49:25","slug":"the-microsoft-365-tenant-looked-fine-until-we-checked-the-security-defaults","status":"publish","type":"post","link":"https:\/\/cloudproinc.com.au\/index.php\/2026\/04\/30\/the-microsoft-365-tenant-looked-fine-until-we-checked-the-security-defaults\/","title":{"rendered":"The Microsoft 365 Tenant Looked Fine Until We Checked the Security Defaults"},"content":{"rendered":"<p>Every Microsoft 365 tenant tells a story. Emails flowing, Teams meetings running, SharePoint humming along. From the outside, everything looks operational. But operational is not the same as secure \u2014 and the gap between those two things is where breaches happen.<\/p>\n\n<p>When our team conducts a Microsoft 365 security assessment, one of the first things we check is the identity baseline. Not the flashy stuff \u2014 the fundamentals. And one of the most common findings we encounter is a tenant where security defaults have been silently disabled, leaving the environment wide open to credential-based attacks.<\/p>\n\n<h2 class=\"wp-block-heading\">What Are Security Defaults?<\/h2>\n\n<p>Security defaults are Microsoft&#8217;s baseline security configurations for Microsoft Entra ID (formerly Azure Active Directory). They enforce MFA registration for all users, require MFA for administrators on every sign-in, block legacy authentication protocols, and protect privileged access to the Azure portal.<\/p>\n\n<p>These controls are enabled by default on all new tenants created after October 2019. Microsoft reports they stop more than 99.9% of common identity-based attacks.<\/p>\n\n<p>So why do we keep finding them turned off?<\/p>\n\n<h2 class=\"wp-block-heading\">The Most Common Reason: Someone Had a Problem<\/h2>\n\n<p>In most cases, security defaults were not disabled maliciously. A multi-function printer couldn&#8217;t send email. An old application broke when MFA kicked in. A migration consultant turned them off to &#8220;get things working&#8221; and never turned them back on.<\/p>\n\n<p>The business moved on. The risk stayed behind.<\/p>\n\n<p>We have seen tenants operating without security defaults for months \u2014 sometimes years \u2014 with no Conditional Access policies in place to replace them. The entire identity layer is effectively unprotected. Administrators signing in without MFA. Legacy authentication wide open. No enforcement, no alerting, no visibility.<\/p>\n\n<h2 class=\"wp-block-heading\">What Security Defaults Actually Protect You From<\/h2>\n\n<p>Legacy authentication protocols \u2014 Basic Auth, IMAP, SMTP, POP3 \u2014 do not support MFA. Full stop. If they are allowed in your tenant, an attacker who obtains a username and password can authenticate silently, bypassing every MFA prompt you think is protecting your users.<\/p>\n\n<p>Password spray attacks rely on this gap. An attacker takes a list of common passwords and tries them across thousands of accounts using legacy protocols. No MFA challenge. No account lockout in some configurations. Just access.<\/p>\n\n<p>Beyond legacy auth, security defaults enforce MFA for the roles with the most access in your organisation \u2014 Global Administrators, Security Administrators, Exchange Administrators, and more. Without this, a compromised admin account is a full tenant compromise.<\/p>\n\n<h2 class=\"wp-block-heading\">The Conditional Access Gap<\/h2>\n\n<p>There is a common misconception we encounter during assessments. A client has Microsoft Entra ID P1 or P2 licensing, they have some Conditional Access policies in place, and they assume they are covered.<\/p>\n\n<p>The issue is partial coverage. A Conditional Access policy for one application, or for a subset of users, does not protect the rest. And if security defaults were disabled to make room for Conditional Access \u2014 which is the correct approach \u2014 but the Conditional Access policies were never completed, the tenant now has neither baseline enforced.<\/p>\n\n<p>This is the gap that attackers find and exploit.<\/p>\n\n<h2 class=\"wp-block-heading\">What a Proper Identity Baseline Looks Like<\/h2>\n\n<p>When our team conducts an assessment and finds security defaults disabled, we work with clients to either re-enable them or implement a complete Conditional Access policy set that provides equivalent or stronger coverage. That means:<\/p>\n\n<ul class=\"wp-block-list\"><li><strong>MFA enforced for all users<\/strong> \u2014 not just admins, not just some applications<\/li><li><strong>Legacy authentication fully blocked<\/strong> \u2014 across all connectors and protocols<\/li><li><strong>Privileged access protected<\/strong> \u2014 with dedicated admin accounts, not shared credentials<\/li><li><strong>Sign-in risk policies<\/strong> \u2014 if Entra ID P2 is licensed, risk-based Conditional Access should be active<\/li><li><strong>Break-glass accounts<\/strong> \u2014 two cloud-only Global Administrator accounts with no MFA requirement, used only in emergencies, with access monitored<\/li><\/ul>\n\n<p>The goal is not to make life harder for users. Modern authentication with the Microsoft Authenticator app is fast, reliable, and non-disruptive. The friction of MFA is minor compared to the cost of a breach.<\/p>\n\n<h2 class=\"wp-block-heading\">A Note on Licensing<\/h2>\n\n<p>Security defaults are free. They require no Entra ID premium licensing and no additional configuration beyond enabling the toggle. For organisations on Microsoft 365 Business Basic or Business Standard, security defaults are the correct starting point.<\/p>\n\n<p>For organisations with Entra ID P1 or P2 licensing, the path forward is Conditional Access \u2014 but only when implemented completely. Half a Conditional Access deployment is not a security posture. It is a false sense of security.<\/p>\n\n<h2 class=\"wp-block-heading\">What Australian Organisations Should Do Now<\/h2>\n\n<p>The Australian Cyber Security Centre&#8217;s Essential 8 framework includes multi-factor authentication as a core mitigation strategy. It is not a recommendation \u2014 it is a requirement for organisations seeking to demonstrate cyber maturity and protect against the threats the ACSC considers highest priority.<\/p>\n\n<p>Checking your tenant&#8217;s security defaults takes minutes. Go to the Microsoft Entra admin center, navigate to Entra ID > Overview > Properties, and select Manage Security Defaults. If it is disabled and you do not have a complete Conditional Access policy set in place, that is a finding that needs to be remediated today.<\/p>\n\n<p>Our team has helped organisations across Australia assess and remediate their Microsoft 365 identity posture. If your tenant looks fine from the outside and you want to know what it looks like from the inside, that conversation is worth having.<\/p>\n\n","protected":false},"excerpt":{"rendered":"<p>Every Microsoft 365 tenant tells a story. Emails flowing, Teams meetings running, SharePoint humming along. From the outside, everything looks operational. But operational is not the same as secure \u2014 and the gap between those two things is where breaches happen. When our team conducts a Microsoft 365 security assessment, one of the first things [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":57513,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_yoast_wpseo_focuskw":"Microsoft 365 security defaults","_yoast_wpseo_title":"M365 Tenant Looked Fine Until We Checked Security Defaults","_yoast_wpseo_metadesc":"Many Microsoft 365 tenants have security defaults silently disabled, leaving identity layers exposed. Learn what we find during M365 security assessments and how to fix it.","_yoast_wpseo_opengraph-title":"M365 Tenant Looked Fine Until We Checked Security Defaults","_yoast_wpseo_opengraph-description":"Many Microsoft 365 tenants have security defaults silently disabled, leaving identity layers exposed. Learn what we find during M365 security assessments and how to fix it.","_yoast_wpseo_twitter-title":"M365 Tenant Looked Fine Until We Checked Security Defaults","_yoast_wpseo_twitter-description":"Many Microsoft 365 tenants have security defaults silently disabled, leaving identity layers exposed. Learn what we find during M365 security assessments and how to fix it.","_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[13,127,107,36,103,14,17],"tags":[],"class_list":["post-57511","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-cloud-security","category-cybersecurity","category-entra-id","category-essential-8","category-microsoft-365","category-microsoft-365-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>M365 Tenant Looked Fine Until We Checked Security Defaults<\/title>\n<meta name=\"description\" content=\"Many Microsoft 365 tenants have security defaults silently disabled, leaving identity layers exposed. Learn what we find during M365 security assessments and how to fix it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/30\/the-microsoft-365-tenant-looked-fine-until-we-checked-the-security-defaults\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"M365 Tenant Looked Fine Until We Checked Security Defaults\" \/>\n<meta property=\"og:description\" content=\"Many Microsoft 365 tenants have security defaults silently disabled, leaving identity layers exposed. Learn what we find during M365 security assessments and how to fix it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/30\/the-microsoft-365-tenant-looked-fine-until-we-checked-the-security-defaults\/\" \/>\n<meta property=\"og:site_name\" content=\"CPI Consulting\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-30T06:47:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-30T06:49:25+00:00\" \/>\n<meta name=\"author\" content=\"CPI Staff\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"M365 Tenant Looked Fine Until We Checked Security Defaults\" \/>\n<meta name=\"twitter:description\" content=\"Many Microsoft 365 tenants have security defaults silently disabled, leaving identity layers exposed. Learn what we find during M365 security assessments and how to fix it.\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"CPI Staff\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/30\\\/the-microsoft-365-tenant-looked-fine-until-we-checked-the-security-defaults\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/30\\\/the-microsoft-365-tenant-looked-fine-until-we-checked-the-security-defaults\\\/\"},\"author\":{\"name\":\"CPI Staff\",\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/#\\\/schema\\\/person\\\/192eeeb0ce91062126ce3822ae88fe6e\"},\"headline\":\"The Microsoft 365 Tenant Looked Fine Until We Checked the Security Defaults\",\"datePublished\":\"2026-04-30T06:47:00+00:00\",\"dateModified\":\"2026-04-30T06:49:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/30\\\/the-microsoft-365-tenant-looked-fine-until-we-checked-the-security-defaults\\\/\"},\"wordCount\":859,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/30\\\/the-microsoft-365-tenant-looked-fine-until-we-checked-the-security-defaults\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/the-microsoft-365-tenant-looked-fine-until-we-checked-the-security-defaults-cover.png\",\"articleSection\":[\"Blog\",\"Cloud Security\",\"Cybersecurity\",\"Entra ID\",\"Essential 8\",\"Microsoft 365\",\"Microsoft 365 Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/30\\\/the-microsoft-365-tenant-looked-fine-until-we-checked-the-security-defaults\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/30\\\/the-microsoft-365-tenant-looked-fine-until-we-checked-the-security-defaults\\\/\",\"url\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/30\\\/the-microsoft-365-tenant-looked-fine-until-we-checked-the-security-defaults\\\/\",\"name\":\"M365 Tenant Looked Fine Until We Checked Security Defaults\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/30\\\/the-microsoft-365-tenant-looked-fine-until-we-checked-the-security-defaults\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/30\\\/the-microsoft-365-tenant-looked-fine-until-we-checked-the-security-defaults\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/the-microsoft-365-tenant-looked-fine-until-we-checked-the-security-defaults-cover.png\",\"datePublished\":\"2026-04-30T06:47:00+00:00\",\"dateModified\":\"2026-04-30T06:49:25+00:00\",\"description\":\"Many Microsoft 365 tenants have security defaults silently disabled, leaving identity layers exposed. Learn what we find during M365 security assessments and how to fix it.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/30\\\/the-microsoft-365-tenant-looked-fine-until-we-checked-the-security-defaults\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/30\\\/the-microsoft-365-tenant-looked-fine-until-we-checked-the-security-defaults\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/30\\\/the-microsoft-365-tenant-looked-fine-until-we-checked-the-security-defaults\\\/#primaryimage\",\"url\":\"\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/the-microsoft-365-tenant-looked-fine-until-we-checked-the-security-defaults-cover.png\",\"contentUrl\":\"\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/the-microsoft-365-tenant-looked-fine-until-we-checked-the-security-defaults-cover.png\",\"width\":1536,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/30\\\/the-microsoft-365-tenant-looked-fine-until-we-checked-the-security-defaults\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Microsoft 365 Tenant Looked Fine Until We Checked the Security Defaults\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/#website\",\"url\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/\",\"name\":\"Cloud Pro Inc - CPI Consulting Pty Ltd\",\"description\":\"Cloud, AI &amp; Cybersecurity Consulting | Melbourne\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/#organization\",\"name\":\"Cloud Pro Inc - Cloud Pro Inc - CPI Consulting Pty Ltd\",\"url\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/favfinalfile.png\",\"contentUrl\":\"\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/favfinalfile.png\",\"width\":500,\"height\":500,\"caption\":\"Cloud Pro Inc - Cloud Pro Inc - CPI Consulting Pty Ltd\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/#\\\/schema\\\/person\\\/192eeeb0ce91062126ce3822ae88fe6e\",\"name\":\"CPI Staff\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g\",\"caption\":\"CPI Staff\"},\"sameAs\":[\"http:\\\/\\\/www.cloudproinc.com.au\"],\"url\":\"https:\\\/\\\/cloudproinc.com.au\\\/index.php\\\/author\\\/cpiadmin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"M365 Tenant Looked Fine Until We Checked Security Defaults","description":"Many Microsoft 365 tenants have security defaults silently disabled, leaving identity layers exposed. Learn what we find during M365 security assessments and how to fix it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/30\/the-microsoft-365-tenant-looked-fine-until-we-checked-the-security-defaults\/","og_locale":"en_US","og_type":"article","og_title":"M365 Tenant Looked Fine Until We Checked Security Defaults","og_description":"Many Microsoft 365 tenants have security defaults silently disabled, leaving identity layers exposed. Learn what we find during M365 security assessments and how to fix it.","og_url":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/30\/the-microsoft-365-tenant-looked-fine-until-we-checked-the-security-defaults\/","og_site_name":"CPI Consulting","article_published_time":"2026-04-30T06:47:00+00:00","article_modified_time":"2026-04-30T06:49:25+00:00","author":"CPI Staff","twitter_card":"summary_large_image","twitter_title":"M365 Tenant Looked Fine Until We Checked Security Defaults","twitter_description":"Many Microsoft 365 tenants have security defaults silently disabled, leaving identity layers exposed. Learn what we find during M365 security assessments and how to fix it.","twitter_misc":{"Written by":"CPI Staff","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/30\/the-microsoft-365-tenant-looked-fine-until-we-checked-the-security-defaults\/#article","isPartOf":{"@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/30\/the-microsoft-365-tenant-looked-fine-until-we-checked-the-security-defaults\/"},"author":{"name":"CPI Staff","@id":"https:\/\/www.cloudproinc.com.au\/#\/schema\/person\/192eeeb0ce91062126ce3822ae88fe6e"},"headline":"The Microsoft 365 Tenant Looked Fine Until We Checked the Security Defaults","datePublished":"2026-04-30T06:47:00+00:00","dateModified":"2026-04-30T06:49:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/30\/the-microsoft-365-tenant-looked-fine-until-we-checked-the-security-defaults\/"},"wordCount":859,"commentCount":0,"publisher":{"@id":"https:\/\/www.cloudproinc.com.au\/#organization"},"image":{"@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/30\/the-microsoft-365-tenant-looked-fine-until-we-checked-the-security-defaults\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2026\/04\/the-microsoft-365-tenant-looked-fine-until-we-checked-the-security-defaults-cover.png","articleSection":["Blog","Cloud Security","Cybersecurity","Entra ID","Essential 8","Microsoft 365","Microsoft 365 Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/30\/the-microsoft-365-tenant-looked-fine-until-we-checked-the-security-defaults\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/30\/the-microsoft-365-tenant-looked-fine-until-we-checked-the-security-defaults\/","url":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/30\/the-microsoft-365-tenant-looked-fine-until-we-checked-the-security-defaults\/","name":"M365 Tenant Looked Fine Until We Checked Security Defaults","isPartOf":{"@id":"https:\/\/www.cloudproinc.com.au\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/30\/the-microsoft-365-tenant-looked-fine-until-we-checked-the-security-defaults\/#primaryimage"},"image":{"@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/30\/the-microsoft-365-tenant-looked-fine-until-we-checked-the-security-defaults\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2026\/04\/the-microsoft-365-tenant-looked-fine-until-we-checked-the-security-defaults-cover.png","datePublished":"2026-04-30T06:47:00+00:00","dateModified":"2026-04-30T06:49:25+00:00","description":"Many Microsoft 365 tenants have security defaults silently disabled, leaving identity layers exposed. Learn what we find during M365 security assessments and how to fix it.","breadcrumb":{"@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/30\/the-microsoft-365-tenant-looked-fine-until-we-checked-the-security-defaults\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/30\/the-microsoft-365-tenant-looked-fine-until-we-checked-the-security-defaults\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/30\/the-microsoft-365-tenant-looked-fine-until-we-checked-the-security-defaults\/#primaryimage","url":"\/wp-content\/uploads\/2026\/04\/the-microsoft-365-tenant-looked-fine-until-we-checked-the-security-defaults-cover.png","contentUrl":"\/wp-content\/uploads\/2026\/04\/the-microsoft-365-tenant-looked-fine-until-we-checked-the-security-defaults-cover.png","width":1536,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/30\/the-microsoft-365-tenant-looked-fine-until-we-checked-the-security-defaults\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cloudproinc.com.au\/"},{"@type":"ListItem","position":2,"name":"The Microsoft 365 Tenant Looked Fine Until We Checked the Security Defaults"}]},{"@type":"WebSite","@id":"https:\/\/www.cloudproinc.com.au\/#website","url":"https:\/\/www.cloudproinc.com.au\/","name":"Cloud Pro Inc - CPI Consulting Pty Ltd","description":"Cloud, AI &amp; Cybersecurity Consulting | Melbourne","publisher":{"@id":"https:\/\/www.cloudproinc.com.au\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cloudproinc.com.au\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cloudproinc.com.au\/#organization","name":"Cloud Pro Inc - Cloud Pro Inc - CPI Consulting Pty Ltd","url":"https:\/\/www.cloudproinc.com.au\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cloudproinc.com.au\/#\/schema\/logo\/image\/","url":"\/wp-content\/uploads\/2022\/01\/favfinalfile.png","contentUrl":"\/wp-content\/uploads\/2022\/01\/favfinalfile.png","width":500,"height":500,"caption":"Cloud Pro Inc - Cloud Pro Inc - CPI Consulting Pty Ltd"},"image":{"@id":"https:\/\/www.cloudproinc.com.au\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cloudproinc.com.au\/#\/schema\/person\/192eeeb0ce91062126ce3822ae88fe6e","name":"CPI Staff","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g","caption":"CPI Staff"},"sameAs":["http:\/\/www.cloudproinc.com.au"],"url":"https:\/\/cloudproinc.com.au\/index.php\/author\/cpiadmin\/"}]}},"jetpack_featured_media_url":"\/wp-content\/uploads\/2026\/04\/the-microsoft-365-tenant-looked-fine-until-we-checked-the-security-defaults-cover.png","jetpack-related-posts":[{"id":57505,"url":"https:\/\/cloudproinc.com.au\/index.php\/2026\/04\/29\/the-first-10-things-we-check-in-a-microsoft-365-security-review\/","url_meta":{"origin":57511,"position":0},"title":"The First 10 Things We Check in a Microsoft 365 Security Review","author":"CPI Staff","date":"April 29, 2026","format":false,"excerpt":"When our team starts a Microsoft 365 security review, we focus on the areas that quickly tell us whether an environment is well controlled, loosely managed, or quietly carrying avoidable risk. For many Australian organisations, Microsoft 365 has become the centre of daily work. Email, files, Teams, devices, identities, and\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/cloudproinc.com.au\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2026\/04\/the-first-10-things-we-check-in-a-microsoft-365-security-review-cover.png","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2026\/04\/the-first-10-things-we-check-in-a-microsoft-365-security-review-cover.png 1x, \/wp-content\/uploads\/2026\/04\/the-first-10-things-we-check-in-a-microsoft-365-security-review-cover.png 1.5x, \/wp-content\/uploads\/2026\/04\/the-first-10-things-we-check-in-a-microsoft-365-security-review-cover.png 2x, \/wp-content\/uploads\/2026\/04\/the-first-10-things-we-check-in-a-microsoft-365-security-review-cover.png 3x, \/wp-content\/uploads\/2026\/04\/the-first-10-things-we-check-in-a-microsoft-365-security-review-cover.png 4x"},"classes":[]},{"id":417,"url":"https:\/\/cloudproinc.com.au\/index.php\/2024\/07\/23\/how-to-use-microsoft-graph-security-api\/","url_meta":{"origin":57511,"position":1},"title":"How to Use Microsoft Graph Security API","author":"CPI Staff","date":"July 23, 2024","format":false,"excerpt":"In this Microsoft Defender XDR article, we will show how to use Microsoft Graph Security API using a REST API client and retrieve XDR alerts. Microsoft Defender Extended Detection and Response (XDR) is an enterprise end-to-end security solution that detects, prevents, investigates and responds to security threats from endpoints, users,\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/cloudproinc.com.au\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2024\/07\/How-to-Use-Microsoft-Graph-Security-API.webp","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2024\/07\/How-to-Use-Microsoft-Graph-Security-API.webp 1x, \/wp-content\/uploads\/2024\/07\/How-to-Use-Microsoft-Graph-Security-API.webp 1.5x, \/wp-content\/uploads\/2024\/07\/How-to-Use-Microsoft-Graph-Security-API.webp 2x, \/wp-content\/uploads\/2024\/07\/How-to-Use-Microsoft-Graph-Security-API.webp 3x, \/wp-content\/uploads\/2024\/07\/How-to-Use-Microsoft-Graph-Security-API.webp 4x"},"classes":[]},{"id":563,"url":"https:\/\/cloudproinc.com.au\/index.php\/2024\/08\/21\/create-a-naming-policy-for-microsoft-365-groups\/","url_meta":{"origin":57511,"position":2},"title":"Create a Naming Policy for Microsoft 365 Groups","author":"CPI Staff","date":"August 21, 2024","format":false,"excerpt":"This Microsoft 365 Entra ID post will explain how to Create a Naming Policy for Microsoft 365 Groups. Table of contentsRequirementsAttributesCreate a Naming Policy for Microsoft 365 GroupsApply Microsoft 365 Naming PolicyMore Articles on the topic Microsoft 365 group naming policy allows organisations to apply naming convention policies for group\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/cloudproinc.com.au\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2024\/07\/Setting-Up-Email-to-Case-in-Dynamics-365.webp","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2024\/07\/Setting-Up-Email-to-Case-in-Dynamics-365.webp 1x, \/wp-content\/uploads\/2024\/07\/Setting-Up-Email-to-Case-in-Dynamics-365.webp 1.5x, \/wp-content\/uploads\/2024\/07\/Setting-Up-Email-to-Case-in-Dynamics-365.webp 2x"},"classes":[]},{"id":57219,"url":"https:\/\/cloudproinc.com.au\/index.php\/2026\/03\/11\/what-agent-365-and-microsoft-365-e7-mean-for-secure-ai-adoption\/","url_meta":{"origin":57511,"position":3},"title":"What Agent 365 and Microsoft 365 E7 Mean for Secure AI Adoption","author":"CPI Staff","date":"March 11, 2026","format":false,"excerpt":"Microsoft\u2019s latest AI and security moves point to a better way to adopt AI at work: make it useful for staff, visible to IT, and governed from day one.","rel":"","context":"In &quot;Agent 365&quot;","block_context":{"text":"Agent 365","link":"https:\/\/cloudproinc.com.au\/index.php\/category\/agent-365\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2026\/03\/post-12.png","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2026\/03\/post-12.png 1x, \/wp-content\/uploads\/2026\/03\/post-12.png 1.5x, \/wp-content\/uploads\/2026\/03\/post-12.png 2x, \/wp-content\/uploads\/2026\/03\/post-12.png 3x, \/wp-content\/uploads\/2026\/03\/post-12.png 4x"},"classes":[]},{"id":53831,"url":"https:\/\/cloudproinc.com.au\/index.php\/2025\/09\/15\/manage-macos-byod-devices-with-microsoft-intune\/","url_meta":{"origin":57511,"position":4},"title":"Manage macOS BYOD Devices with Microsoft Intune","author":"CPI Staff","date":"September 15, 2025","format":false,"excerpt":"A practical guide to enroll, secure, and support personal Macs with Intune\u2014without ruining the user experience or sacrificing privacy.","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/cloudproinc.com.au\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2025\/09\/manage-macos-byod-devices-with-microsoft-intune-the-right-way.png","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2025\/09\/manage-macos-byod-devices-with-microsoft-intune-the-right-way.png 1x, \/wp-content\/uploads\/2025\/09\/manage-macos-byod-devices-with-microsoft-intune-the-right-way.png 1.5x, \/wp-content\/uploads\/2025\/09\/manage-macos-byod-devices-with-microsoft-intune-the-right-way.png 2x, \/wp-content\/uploads\/2025\/09\/manage-macos-byod-devices-with-microsoft-intune-the-right-way.png 3x, \/wp-content\/uploads\/2025\/09\/manage-macos-byod-devices-with-microsoft-intune-the-right-way.png 4x"},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/posts\/57511","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/comments?post=57511"}],"version-history":[{"count":1,"href":"https:\/\/cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/posts\/57511\/revisions"}],"predecessor-version":[{"id":57512,"href":"https:\/\/cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/posts\/57511\/revisions\/57512"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/media\/57513"}],"wp:attachment":[{"href":"https:\/\/cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/media?parent=57511"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/categories?post=57511"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/tags?post=57511"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}