Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Security baseline requirements include covering the core and basic considerations for a Microsoft tenant.
Products
- Microsoft 365 A1
- Microsoft Entra ID
Deployment guide steps
Malware protection
| Step | |
|---|---|
| ☐ | Enable anti-malware policies in Exchange Online Protection |
Spam protection
| Step | |
|---|---|
| ☐ | Enable anti-spam protection in Exchange Online Protection |
Phishing protection
| Step | |
|---|---|
| ☐ | Enable Anti-Phishing policies in Exchange Online Protection |
Spoofing prevention and intelligence
| Step | |
|---|---|
| ☐ | Enable spoofing attempts can be enabled within your organization’s anti-phishing policies |
Zero-Hour Auto Purge (ZAP)
| Step | |
|---|---|
| ☐ | Enabled ZAP within your Anti-Spam policy and Anti-Malware policy |
Purview message encryption
| Step | |
|---|---|
| ☐ | Enable or verify Purview message encryption |
Next steps
The next step is configuring security.