Home About Tools Projects Guides & Blog ⚡ Hire Me ✦ Websites Contact →
Home Projects Secure Score Improvement
M365 Security · Tenant Hardening

Microsoft Secure Score
34% → 81%

A real SMB tenant, starting from the default Microsoft 365 configuration. Every improvement action documented, every trade-off explained. A repeatable playbook for taking a neglected tenant to a strong security baseline.

Status Complete
Starting score 34%
Final score 81%
Actions taken 47 improvements
Licence M365 Business Premium
// the numbers

Before & after

Starting score
34%
Default M365 config · No MFA · No CA policies
Final score
81%
MFA enforced · CA framework · Defender configured
Before ~170 / 500 pts
0%50%100%
After ~405 / 500 pts
0%50%100%
// overview

Why Secure Score matters for SMBs

Microsoft Secure Score is a measurement of an organisation's security posture relative to the controls available in their licence. A score of 34% on M365 Business Premium means roughly two-thirds of the security controls included in the licence are switched off or misconfigured.

Secure Score is one of the first things I pull up when auditing a new tenant. It gives an immediate, quantified picture of what's misconfigured or switched off, and as improvements are made, the number moves in real time. It's one of the clearest ways to show progress on a security engagement.

⚠️
34% is typical for an unconfigured tenant. Most SMBs that buy M365 Business Premium without dedicated IT get to this score by default. Microsoft enables just enough to function, but not enough to be properly secure.
// approach

Four-phase improvement plan

Improvements were tackled in order of impact and risk. Quick wins first, then the more complex configurations that need testing before being enforced.

1
Critical / Quick wins
+18 pts
Enable MFA registration for all users (Security Defaults or per-user MFA)
Disable Security Defaults and move to Conditional Access (prevents overlap)
Block legacy authentication protocols (Exchange Online, SharePoint)
Enable self-service password reset (SSPR) for all users
Remove unused global admin accounts and excess privileged roles
2
Identity & Access hardening
+22 pts
Deploy Conditional Access framework (9 policies, covered in the CA Framework project)
Enable Microsoft Authenticator as default MFA method, disable SMS
Configure named locations and mark office IPs as trusted
Enable number matching and additional context for Authenticator push
Review and remove stale guest accounts from Entra ID
Enable Entra ID Identity Protection with user and sign-in risk policies
3
Endpoint & Device security
+15 pts
Enrol all Windows devices into Intune via Autopilot or manual enrolment
Deploy Intune compliance policy (BitLocker, Defender AV, OS version, PIN)
Enable Microsoft Defender for Business with all protection features switched on
Configure Defender attack surface reduction (ASR) rules in Audit first
Enable Endpoint Detection and Response (EDR) via Defender for Endpoint
Deploy BitLocker encryption policy via Intune, store keys in Entra ID
4
Data & App protection
+12 pts
Enable Microsoft Purview sensitivity labels for email and documents
Configure basic DLP policy to block external sharing of financial and personal data
Enable Exchange Online Protection with anti-phishing, anti-spam, and safe links
Enable Defender for Office 365 with safe attachments in Dynamic Delivery mode
Configure SPF, DKIM, and DMARC records for the domain
Set SharePoint external sharing to "Existing guests only"
// top actions

Highest-impact single actions

Not all Secure Score actions are equal. These are the ones with the biggest point return relative to effort.

ActionPointsEffort
Require MFA for all users (via CA)+28 ptsMedium
Block legacy authentication+10 ptsLow
Enable Defender for Business (all features)+9 ptsLow
Enable number matching on Authenticator+9 ptsLow
BitLocker on all managed devices+7 ptsMedium
DMARC policy set to reject/quarantine+5 ptsLow
Enable Safe Attachments for O365+4 ptsLow
Reduce global admin count to 2+4 ptsLow
Enable Intune compliance policies+4 ptsMedium
Enable Identity Protection risk policies+3 ptsMedium
// trade-offs

What was deliberately skipped

Secure Score does not mean maximum score at any cost. Some actions were skipped because they'd cause more disruption than benefit for an SMB with this profile.

Privileged Identity Management (PIM)
Requires Entra ID P2. Valuable but adds overhead for small IT teams. Recommended as a future upgrade once the P1 baseline is solid.
Microsoft Purview full DLP suite
Complex to configure correctly for SMBs without a defined data classification policy. Basic sensitivity labels were deployed; full DLP left for a follow-on engagement.
ASR rules in enforcement mode
Attack surface reduction rules in Audit mode first. Several rules broke legitimate LOB applications in testing. Enforcement phase planned after a full audit period.
Intune MAM for personal devices
Mobile Application Management adds value but requires a change management process with end users. Left out of scope for this engagement to avoid user pushback.
💡
81% is a realistic target for M365 Business Premium. Getting from 81% to 90%+ requires P2 licences (PIM, full Identity Protection) and more complex configurations that may not be cost-effective for smaller businesses.
Final Secure Score
81%
M365 Business Premium tenant
0%50%100%