In this episode Chris shares 5 things you should configure in Microsoft 365 to make your tenant more secure and Koos introduces “Summary Rules” in Microsoft Sentinel. What are “Summary Rules”? And what new opportunities might bring it to your logging strategies?



5 ways to harden your Microsoft 365 tenant Security

There are many out-of-the-box configurations in M365 that are optimized for productivity and less than optimal from a security perspective. I thought it would be a good idea to go back to the basics today and talk about 5 things you can and should be doing to make your tenant more secure.

Disable user app registration

Setting “Users can register applications” to “No” in Microsoft 365 is a security measure to prevent users from registering their own applications within the organization’s environment. Here’s why this can be important:

If your organization requires certain users to register applications, you can manage this through specific roles and policies rather than leaving it open to all users.

  1. Navigate to Microsoft Entra admin center https://entra.microsoft.com/
  2. Click to expand Identity > Users select Users settings.
  3. Set Users can register applications to No.
  4. Click Save.

Setting “User consent for applications” to “Do not allow user consent” in Microsoft 365 enhances security and governance by ensuring only administrators control which applications can access organizational data. Here’s why it’s a recommended practice:

If you need flexibility, you can configure specific consent policies, allowing only trusted applications or designated users to request access. Tenant-wide admin consent can be requested by users through an integrated administrator consent request workflow or through organizational support processes

  1. Navigate to Microsoft Entra admin center https://entra.microsoft.com/
  2. Click to expand Identity > Applications select Enterprise applications.
  3. Under Security select Consent and permissions > User consent settings.
  4. Under User consent for applications select Do not allow user consent.
  5. Click the Save option at the top of the window.

Allow collaboration invitations to trusted domains only

Restricting user invitations to specified domains in Entra ID is a security best practice that ensures external collaboration remains controlled and aligned with organizational policies. Here’s why it’s a good idea:

If your organization regularly collaborates with specific external partners, this policy ensures that only trusted domains are allowed. You should ensure that you have a process users can follow to request a trusted domain.

  1. Navigate to Microsoft Entra admin center https://entra.microsoft.com/
  2. Click to expand Identity > External Identities select External collaboration settings.
  3. Under Collaboration restrictions, select Allow invitations only to the specified domains (most restrictive) is selected. Then specify the allowed domains under Target domains.

Manage SharePoint external sharing through domain allow lists

Setting SharePoint to limit external sharing by domain is a strategic way to maintain security, control data access, and prevent unauthorized sharing. Here’s why it’s a good practice:

If your organization regularly collaborates with specific external entities, this policy allows seamless access while keeping security tight.

  1. Navigate to SharePoint admin center https://admin.microsoft.com/sharepoint
  2. Expand Policies then click Sharing.
  3. Expand More external sharing settings and check Limit external sharing by domain.
  4. Select Add domains to add a list of approved domains.
  5. Click Save at the bottom of the page.

Disable communication with unmanaged Teams users

Setting “People in my organization can communicate with unmanaged Teams accounts” to “Off” in Microsoft Teams is an important security measure to control communication and prevent unauthorized data sharing. Here’s why it matters:

If your organization needs to collaborate externally, setting up verified guest accounts or using controlled external access policies is a safer alternative.

  1. Navigate to Microsoft Teams admin center https://admin.teams.microsoft.com/
  2. Click to expand Users select External access.
  3. Select the Policies tab
  4. Click on the Global (Org-wide default) policy.
  5. Set People in my organization can communicate with unmanaged Teams accounts to Off.
  6. Click Save.

Sentinel Summary Rules

In episode 4 back in March I spoke about the different table tiers in Sentinel. Auxiliary tier was still in preview back then, now it’s GA. But one of the downsides to these lower-tiered table plans is that you can’t use the data for real-time incident creation with your Sentinel Analytic Rules. And as I eluded earlier; you might want to consider looking into Azure Data Explorer for this reason alone since the costs will even be lower there.

Well, with Summary Rules I think Microsoft took a nice step into the right direction for making sure customers keep their data in Sentinel by increasing the value of logs in Auxiliary and Basis tables.

What is a Summary Rule?

summary_rules

Example scenarios

anomalies

But remember

Read more

🛠️ Community Project

MDE Automator

Microsoft MVP Eric Mannon has created a very elaborate Toolkit for Defender for Endpoint! His experiences in the SecOps space led to the creation of a set of tools which can help with day-to-day incident response tasks in MDE environments.

It consists of:

Check it out on Github

And make sure to follow Eric on LinkedIn! He not only has some useful insights for Incident Response challenges, SIEM and Microsoft Security products in general, his posts are also very enjoyable and funny to read.