Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Security baseline requirements include covering the core and basic considerations for a Microsoft tenant.
Products
- Microsoft 365 A1
- Microsoft Entra ID
Deployment guide steps
Malware protection
Step | |
---|---|
☐ | Enable anti-malware policies in Exchange Online Protection |
Spam protection
Step | |
---|---|
☐ | Enable anti-spam protection in Exchange Online Protection |
Phishing protection
Step | |
---|---|
☐ | Enable Anti-Phishing policies in Exchange Online Protection |
Spoofing prevention and intelligence
Step | |
---|---|
☐ | Enable spoofing attempts can be enabled within your organization’s anti-phishing policies |
Zero-Hour Auto Purge (ZAP)
Step | |
---|---|
☐ | Enabled ZAP within your Anti-Spam policy and Anti-Malware policy |
Purview message encryption
Step | |
---|---|
☐ | Enable or verify Purview message encryption |
Next steps
The next step is configuring security.