MSFT365 Security Control Checklist
Understand restrictions and how to use them
All organizations need to review their current M365 Tenants and use current written policies for enabling the proper controls.
Organization of all types will benefit from enabling the most common controls regardless of whether the tenant is new or currently being used.
This checklist helps organizations deploy successful security capabilities.
Download the checklist for more information on:
- Multi-Factor authentication for end-users and administrators
- Conditional access policies for controlling access
- Block legacy authentication protocols to reduce the surface area of attack
By submitting my contact information, I confirm that I have read and
which explains how my personal data is
collected, processed and shared.
This Checklist is sponsored by Egnyte.