All organizations need to review their current M365 Tenants and use current written policies for enabling the proper controls.
Organization of all types will benefit from enabling the most common controls regardless of whether the tenant is new or currently being used.
This checklist helps organizations deploy successful security capabilities.
Download the checklist for more information on:
● Multi-Factor authentication for end-users and administrators
● Conditional access policies for controlling access
● Block legacy authentication protocols to reduce the surface area of attack