Edit

Share via


Get started with Microsoft Defender for Office 365

In new Microsoft 365 organizations with Microsoft Defender for Office 365 (included or as an add-on subscription), this article describes the configuration steps you need to do in the earliest days of your organization.

Although your Microsoft 365 organization includes a default level of protection from the moment you create it (or add Defender for Office 365 to it), the steps in this article give you an actionable plan to unleash the full protection capabilities of Defender for Office 365. After you complete the steps, you can also use this article to show management that you're maximizing your investment in Microsoft 365.

The steps to configure Defender for Office 365 are described in the following diagram:

A conceptual diagram showing the steps to configure Defender for Office 365.

Tip

As a companion to this article, see our Microsoft Defender for Office 365 setup guide to review best practices and to protect against email, link, and collaboration threats. Features include Safe Links, Safe Attachments, and more. For a customized experience based on your environment, you can access the Microsoft Defender for Office 365 automated setup guide in the Microsoft 365 admin center.

Requirements

Default email protections are included in all Microsoft 365 subscriptions with cloud mailboxes. Defender for Office 365 includes more protection features. For detailed feature comparisons, see Microsoft Defender for Office 365 overview.

Roles and permissions

Configuration requires permissions. The following table lists the permissions that you need to do the steps in this article (one is enough; you don't need all of them).

Role or role group Learn more
Global Administrator in Microsoft Entra* Microsoft Entra built-in roles
Organization Management in Email & collaboration role groups Role groups in Microsoft Defender for Office 365
Security Administrator in Microsoft Entra Microsoft Entra built-in roles
Security Administrator in Email & collaboration role groups Email & collaboration permissions in Microsoft Defender for Office 365
Exchange Online Organization Management Permissions in Exchange Online

Important

* Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.

Step 1: Configure email authentication for your Microsoft 365 domains

Summary: Configure SPF, DKIM, and DMARC records (in that order) for all custom Microsoft 365 domains (including parked domains and subdomains). If necessary, configure any trusted ARC sealers.

Details:

Email authentication (also known as email validation) is a group of standards to verify that email messages are legitimate, unaltered, and come from expected sources for the sender's email ___domain. For more information, see Email authentication.

We assume you're using one or more custom domains in Microsoft 365 for email (for example contoso.com), so you need to create specific email authentication DNS records for each custom email ___domain.

Create the following email authentication DNS records at your DNS registrar or DNS hosting service for each custom ___domain that you use for email in Microsoft 365:

  • Sender Policy Framework (SPF): The SPF TXT record identifies valid sources of email from senders in the ___domain. For instructions, see Set up SPF to identify valid email sources for your custom cloud domains.

  • DomainKeys Identified Mail (DKIM): DKIM signs outbound messages and stores the signature in the message header that survives message forwarding. For instructions, see Set up DKIM to sign mail from your cloud ___domain.

  • Domain-based Message Authentication, Reporting, and Conformance (DMARC): DMARC helps destination email servers decide what to do with messages from the custom ___domain that fail SPF and DKIM checks. Be sure to include the DMARC policy (p=reject or p=quarantine) and DMARC report destinations (aggregate and forensic reports) in the DMARC records. for instructions, see Set up DMARC to validate the From address ___domain for cloud senders.

  • Authenticated Received Chain (ARC): If a non-Microsoft service modifies inbound messages before delivery to Microsoft 365, you can identify the service as a trusted ARC sealer (if the service supports it). Trusted ARC sealers preserve unmodified email information so the modified messages don't automatically fail email authentication checks in Microsoft 365. For instructions, see Configure trusted ARC sealers.

If you're using the *.onmicrosoft.com ___domain for email (also known as the Microsoft Online Email Routing Address or MOERA ___domain), there's not nearly as much for you to do:

  • SPF: An SPF record is already configured for the *.onmicrosoft.com ___domain.
  • DKIM: DKIM signing is already configured for outbound mail using the *.onmicrosoft.com ___domain, but you can also manually customize it.
  • DMARC: You need to manually set up the DMARC record for the *.onmicrosoft.com ___domain as described here.

Step 2: Configure threat policies

Summary: Turn on and use the Standard and/or Strict preset security policies for all recipients. Or, if business needs dictate, create and use custom threat policies instead, but check them periodically using the configuration analyzer.

Details:

As you can probably imagine, a lot of threat policies for email and collaboration security are available in Microsoft 365. There are three basic types of policies:

  • Default threat policies: These policies exist from the moment the organization is created. They apply to all recipients in the organization, you can't turn off the policies, and you can't modify who the policies apply to. But you can modify the security settings in the policies just like custom threat policies. The settings in the default threat policies are described in the tables in Recommended email and collaboration threat policy settings for cloud organizations.

  • Preset security policies: Preset security policies are actually profiles that contain most of the available threat policies in Defender for Office 365 with settings that are tailored to specific levels of protection. The preset security policies are:

    • The Strict preset security policy.
    • The Standard preset security policy.
    • Built-in protection.

    The Standard and Strict preset security policies are turned off by default until you turn them on. You specify recipient conditions and exceptions (users, group members, domains, or all recipients) for default email protection features for cloud mailboxes and protection features in Defender for Office 365 within the Standard and Strict preset security policies.

    Built-in protection in Defender for Office 365 is on by default to provides basic Safe Attachments and Safe Links protection for all recipients. You can specify recipient exceptions to identify users who don't get the protection.

    In Standard and Strict preset security policies in Defender for Office 365 organizations, you need to configure entries and optional exceptions for user and ___domain impersonation protection. All other settings are locked into our recommended standard and strict values (many of which are the same). You can see the Standard and Strict values in the tables in Recommended email and collaboration threat policy settings for cloud organizations, and you can see the differences between Standard and Strict here.

    As new protection capabilities are added to Defender for Office 365 and as the security landscape changes, the settings in preset security policies are automatically updated to our recommended settings.

  • Custom threat policies: For most available policies, you can create any number of custom threat policies. You can apply the policies to users using recipient conditions and exceptions (users, group members, or domains) and you can customize the settings.

The previous information and the threat policies involved are summarized in the following table:

  Default threat policies Preset security policies Custom threat policies
Threat policies in default email protections for cloud mailboxes:
  Anti-malware
  Anti-spam
  Anti-phishing (spoofing protection)
  Outbound spam
  Connection filtering ✔¹
Threat policies in Defender for Office 365:
  Anti-phishing (spoofing protection) plus: ✔² ✔²
  Safe Links ³
  Safe Attachments ³
General behavior
  Protection on by default?
  Configure conditions/exceptions for protection? ✔⁵
  Customize security settings?
  Protection settings automatically updated?

¹ There are no default entries in the IP Allow List or the IP Block List, so the default connection filter policy effectively does nothing unless you customize the settings.

² There are no entries or optional exceptions for user impersonation or ___domain impersonation protection in Defender for Office 365 until you configure them.

³ Although there are no default Safe Attachments or Safe Links policies in Defender for Office 365, the Built-in protection preset security policy provides basic Safe Attachments and Safe Links protection that's always on.

⁴ The Built-in protection preset security policy (Safe Attachments and Safe Links protection in Defender for Office 365) is the only preset security policy that's on by default.

⁵ For the Standard and Strict preset security policies, you can configure separate recipient conditions and optional exceptions for the default email protections for all cloud mailboxes and protections in Defender for Office 365. For Built-in protection in Defender for Office 365, you can only configure recipient exceptions from protection.

⁶ The only customizable security settings in preset security policies are the entries and optional exceptions for user impersonation protection and ___domain impersonation protection in the Standard and Strict preset security policies in Defender for Office 365.

Order of precedence for threat policies

How threat policies are applied is an important consideration as you decide how to configure security settings for users. The important points to remember are:

  • Protection features have an unconfigurable order of processing. For example, incoming messages are always evaluated for malware before spam.
  • The threat policies of a specific feature (anti-spam, anti-malware, anti-phishing, etc.) are applied in a specific order of precedence (more on the order of precedence later).
  • If a user is intentionally or unintentionally included in multiple policies of a specific feature, the first applicable threat policy for that feature (based on the order of precedence) determines what happens to the item (a message, file, URL, etc.).
  • Once the first threat policy is applied to a specific item for a user, policy processing for that feature stops. No more threat policies of that feature are evaluated for that user and that specific item.

The order of precedence is explained in detail at Order of precedence for preset security policies and other policies, but is briefly summarized here:

  1. Threat policies in preset security policies:
    1. The Strict preset security policy.
    2. The Standard preset security policy.
  2. Custom threat policies for a specific feature (for example, anti-malware policies). Each custom policy has a priority value that determines the order that the policy is applied in relation to other threat policies for the same feature:
    1. A custom threat policy with the priority value 0.
    2. A custom threat policy with the priority value 1.
    3. And so on.
  3. The default threat policy of a specific feature (for example, anti-malware) or the Built-in protection preset security policy in Defender for Office 365 (Safe Links and Safe Attachments).

Refer to the previous table to see how a specific threat policy is represented in the precedence order. For example, anti-malware policies are present at each level. Outbound spam policies are available at the custom policy and default policy levels. The connection filter policy is available only at the default policy level.

To avoid confusion and unintended application of policies, use the following guidelines:

  • Use unambiguous groups or lists of recipients at each level. For example, use different groups or lists of recipients for the Standard and Strict preset security policies.
  • Configure exceptions at each level as required. For example, configure recipients who need custom threat policies as exceptions to the Standard and Strict preset security policies.
  • Any remaining recipients that aren't identified at the higher levels get the default threat policies or Built-in protection in Defender for Office 365 (Safe Links and Safe Attachments).

Armed with this information, you can decide the best way to implement threat policies in the organization.

Determine your threat policy strategy

Now that you know about the different types of threat policies and how they're applied, you can decide how you want to protect the users in your organization. Your decision inevitably falls somewhere within the following spectrum:

  • Use the Standard preset security policy only.
  • Use the Standard and Strict preset security policies.
  • Use preset security policies and custom threat policies.
  • Use custom threat policies only.

Remember, default threat policies (and the Built-in protection preset security policy in Defender for Office 365) automatically protect all recipients in the organization (anyone who isn't defined in the Standard or Strict preset security policy or in custom threat policies). So even if you do nothing, all recipients in the organization get the default protections as described in Recommended email and collaboration threat policy settings for cloud organizations.

It's also important to realize that you aren't locked into your initial decision forever. The information in the recommended settings tables and the comparison table for Standard and Strict should allow you to make an informed decision. But if needs, results, or circumstances change, it's not difficult to switch to a different strategy later.

Without a compelling business need that indicates otherwise, we recommend starting with the Standard preset security policy for all users in your organization. Preset security policies are configured with settings based on years of observations in the Microsoft 365 datacenters, and should be the right choice for the majority of organizations. And, the policies are automatically updated to match the threats of the security landscape.

In preset security policies, you can select the All recipients option to easily apply protection to all recipients in the organization.

If you want to include some users in the Strict preset security policy and the remaining users in the Standard preset security policy, remember to account for the order of precedence as described earlier in this article with the following methods:

  • Use unambiguous groups or lists of recipients in each preset security policy.

    or

  • Configure recipients who should get the settings of the Standard preset security policy as exceptions in the Strict preset security policy.

Keep in mind that the following protection feature configurations are unaffected by preset security policies (you can use preset security policies and also independently configure these protection settings):

To turn on and configure preset security policies, see Preset security policies.

The decision to use custom threat policies instead of or in addition to preset security policies ultimately comes down to the following business requirements:

  • Users require security settings that are different from the unmodifiable settings in preset security policies (junk vs. quarantine or vice-versa, no safety tips, notify custom recipients, etc.).
  • Users require settings that aren't configured in preset security policies (for example, blocking email from specific countries or in specific languages in anti-spam policies).
  • Users need a quarantine experience that's different from the unmodifiable settings in preset security policies. Quarantine policies define what users can do to their quarantined messages based on why the message was quarantined, and whether recipients are notified about their quarantined messages. The default end-user quarantine experience is summarized in the table in this article and the quarantine policies that are used in the Standard and Strict preset security policies are described in the tables in this article.

Use the information in Recommended email and collaboration threat policy settings for cloud organizations to compare the available settings in custom threat policies or default threat policies versus what's configured in the Standard and Strict preset security policies.

Design guidelines for multiple custom threat policies for a specific feature (for example, anti-malware policies) include:

  • Users in custom threat policies can't be included in the Standard or Strict preset security policies due to the order of precedence.
  • Assign fewer users to higher priority policies and more users to lower priority policies.
  • Configure higher priority policies to have stricter or more specialized settings than lower priority policies (including the default policies).

If you decide to use custom threat policies, use the Configuration analyzer to periodically compare the settings in your policies to the recommended settings in the Standard and Strict preset security policies.

Step 3: Assign permissions to admins

Summary: Assign the Security Administrator role in Microsoft Entra to other admins, specialists, and help desk personnel so they can do security tasks in Defender for Office 365.

Details:

You're probably already using the initial account that you used to enroll in Microsoft 365 to do all the work in this deployment guide. That account is an admin everywhere in Microsoft 365 (specifically, it's a member of the Global Administrator role in Microsoft Entra), and allows you to do pretty much anything. The required permissions were described earlier in this article at Roles and permissions.

But, the intent of this step is to configure other admins to help you manage the features Defender for Office 365 in the future. What you don't want is a lot of people with Global Administrator power who don't need it. For example, do they really need to delete/create accounts or make other users Global Administrators? The concept of least privilege (assigning only the required permissions to do the job and nothing more) is a good practice to follow.

When it comes to assigning permissions for tasks Defender for Office 365, the following options are available:

For simplicity, we recommend using the Security Administrator role in Microsoft Entra for others who need to configure settings in Defender for Office 365.

For instructions, see Assign Microsoft Entra roles to users and Manage access to Microsoft Defender XDR with Microsoft Entra global roles.

Step 4: Priority accounts and user tags

Summary: Identify and tag the appropriate users in your organization as priority accounts for easier identification in reports and investigations, and to receive priority account protection in Defender for Office 365. Consider creating and applying custom user tags in Defender for Office 365 Plan 2.

Details:

In Defender for Office 365, priority accounts allows you to tag up to 250 high value users for ease of identification in reports and investigations. These priority account also receive additional heuristics that don't benefit regular employees. For more information, see Manage and monitor priority accounts and Configure and review priority account protection in Microsoft Defender for Office 365.

In Defender for Office 365 Plan 2, you also have access to create and apply custom user tags to easily identify specific groups of users in reports and investigations. For more information, see User tags in Microsoft Defender for Office 365.

Identify appropriate users to tag as priority accounts, and decide if you need to create and apply custom user tags.

Step 5: Review and configure user reported message settings

Summary: Use the built-in Report button in Outlook or a supported non-Microsoft tool so users can report false positives and false negatives in Outlook, and so those reported messages are available to admins on the User-reported tab of the Submissions page in the Defender portal. Configure the organization so reported messages go to a specified reporting mailbox, to Microsoft, or both.

Details:

The ability of users to report good messages marked as bad (false positives) or bad messages allowed (false negatives) is important for you to monitor and adjust protection settings in Defender for Office 365.

The important parts of user message reporting are:

  • How do users report messages?: Make sure clients are using one of the following methods so reported messages appear on the User-reported tab of the Submissions page in the Defender portal at https://security.microsoft.com/reportsubmission?viewid=user:

  • The built-in Report button in Outlook on the web (formerly known as Outlook Web App or OWA).

  • Non-Microsoft reporting tools that use the supported message submission format.

  • Where do user reported messages go?: You have the following options:

    • To a designated reporting mailbox and to Microsoft (this is the default value).
    • To a designated reporting mailbox only.
    • To Microsoft only.

    The default mailbox that's used to collect user reported messages is the Global Administrator's mailbox (the initial account in the organization). If you want user reported messages to go to a reporting mailbox in your organization, you should create and configure an exclusive mailbox to use.

    It's up to you whether you want user reported messages to also go to Microsoft for analysis (exclusively or along with delivery to your designated reporting mailbox).

    If you want user reported messages to go only to your designated reporting mailbox, admins should manually submit user reported messages to Microsoft for analysis from the User-reported tab of the Submissions page in the Defender portal at https://security.microsoft.com/reportsubmission?viewid=user.

    Submitting user reported messages to Microsoft is important to allow our filters to learn and improve.

For complete information about user reported message settings, see User reported settings.

Step 6: Block and allow entries

Summary: Familiarize yourself with the procedures to block and allow messages, files and URLs in Defender for Office 365.

Details:

You need to become familiar with how to block and (temporarily) allow message senders, files, and URLs at the following locations in the Defender portal:

In general, it's easier to create blocks than allows, because unnecessary allow entries expose your organization to malicious email that the system would otherwise filter.

  • Block:

    • You can create block entries for domains and email addresses, files, and URLs on the corresponding tabs in the Tenant Allow/Block List and by submitting the items to Microsoft for analysis from the Submissions page. When you submit an item to Microsoft, corresponding block entries are also created in the Tenant Allow/Block List.

      Tip

      Users in the organization also can't send email to domains or email addresses that are specified in block entries in the Tenant Allow/Block List.

    • Messages blocked by spoof intelligence are shown on the Spoof intelligence page. If you change an allow entry to a block entry, the sender becomes a manual block entry on the Spoofed senders tab in the Tenant Allow/Block List. You can also proactively create block entries for not yet encountered spoofed senders on the Spoofed senders tab.

  • Allow:

    • You can create allow entries for domains and email addresses and URLs on the corresponding tabs in the Tenant Allow/Block List to override the following verdicts:

      • Bulk
      • Spam
      • High confidence spam
      • Phishing (not high confidence phishing)
    • You can't create allow entries directly in the Tenant Allow/Block List for the following items:

      • Malware or high confidence phishing verdicts for domains and email addresses or URLs.
      • Any verdicts for files.

      Instead, you use the Submissions page to report the items to Microsoft. After you select I've confirmed it's clean, you can then select Allow this message, Allow this URL, or Allow this file to create a corresponding temporary allow entry in the Tenant Allow/Block list.

    • Messages allowed by spoof intelligence are shown on the Spoof intelligence page. If you change a block entry to an allow entry, the sender becomes a manual allow entry on the Spoofed senders tab in the Tenant Allow/Block List. You can also proactively create allow entries for not yet encountered spoofed senders on the Spoofed senders tab.

For complete details, see the following articles:

Step 7: Launch phishing simulations using Attack simulation training

In Defender for Office 365 Plan 2, Attack simulation training allows you to send simulated phishing messages to users and assign training based on how they respond. The following options are available:

  • Individual simulations using built-in or custom payloads.
  • Simulation automations taken from real-world phishing attacks using multiple payloads and automated scheduling.
  • Training-only campaigns where you don't need to launch a campaign and wait for users to click links or download attachments in the simulated phishing messages before trainings are assigned.

For more information, see Get started using Attack simulation training.

Step 8: Investigate and respond

Now that your initial set up is complete, use the information in the Microsoft Defender for Office 365 Security Operations Guide to monitor and investigate threats in the organization.