{"id":1188,"date":"2026-03-22T09:00:00","date_gmt":"2026-03-22T09:00:00","guid":{"rendered":"https:\/\/exposiq.ch\/microsoft-365-and-cloud-security-what-smes-should-check\/"},"modified":"2026-03-22T09:00:00","modified_gmt":"2026-03-22T09:00:00","slug":"microsoft-365-and-cloud-security-what-smes-should-check","status":"publish","type":"post","link":"https:\/\/exposiq.ch\/en\/microsoft-365-and-cloud-security-what-smes-should-check\/","title":{"rendered":"Microsoft 365 and Cloud Security: What SMEs Should Check"},"content":{"rendered":"<p>Migrating to Microsoft 365 is one of the most common IT projects at Swiss SMEs. Email, document management, collaboration &#8212; all from one provider, all in the cloud. But with the move to M365, a dangerous misconception arises: many companies believe that Microsoft takes care of security. This is only partially true.<\/p>\n<h2>The Shared Responsibility Model<\/h2>\n<p>Microsoft operates the infrastructure behind Microsoft 365: data centres, networks, platform security, physical security. Microsoft is responsible for this and invests billions in this area.<\/p>\n<p>However, <strong>configuration, user management, access control, and the protection of your data<\/strong> are your responsibility. Microsoft calls this the &#8220;Shared Responsibility Model.&#8221; In practice, it means:<\/p>\n<ul>\n<li><strong>Microsoft secures:<\/strong> The platform, physical infrastructure, service availability, server software updates<\/li>\n<li><strong>You secure:<\/strong> User accounts, access rights, data classification, security settings configuration, compliance requirements<\/li>\n<\/ul>\n<p>This means concretely: if an attacker logs into your M365 account with stolen credentials, that is not Microsoft&#8217;s problem. If sensitive documents are publicly accessible through a misconfigured SharePoint share, the responsibility lies with you. And if an employee loses their account because MFA was not enabled, Microsoft is not liable.<\/p>\n<h2>The Most Common Security Gaps in M365 Environments<\/h2>\n<p>From practical experience, security experts are familiar with a range of configuration errors that occur repeatedly in SME M365 environments. Many of these are default settings that were never adjusted.<\/p>\n<h3>1. Multi-Factor Authentication Not Enforced<\/h3>\n<p>MFA is the single most important security measure for cloud accounts. Microsoft states that MFA prevents over 99 per cent of automated account takeovers. And yet, MFA is not enabled for all users in many SME tenants.<\/p>\n<p>Common excuses: &#8220;It&#8217;s too inconvenient,&#8221; &#8220;It doesn&#8217;t work with our printer,&#8221; &#8220;Management doesn&#8217;t want it.&#8221; The result: a single stolen password is enough to access all emails, documents, and Teams chats of an employee.<\/p>\n<p><strong>Recommendation:<\/strong> Enable MFA for <strong>all<\/strong> users, without exception. Use the Microsoft Authenticator app or FIDO2 security keys instead of SMS.<\/p>\n<h3>2. Legacy Authentication Still Active<\/h3>\n<p>Legacy authentication protocols such as POP3, IMAP, and SMTP Basic Auth do not support MFA. Attackers deliberately use these protocols to bypass MFA. Even if MFA is enabled for regular sign-in, an attacker can access the mailbox via IMAP with a stolen password.<\/p>\n<p>Microsoft has gradually disabled Basic Authentication for Exchange Online, but in many tenants, exceptions are configured &#8212; often for older devices or applications that do not support Modern Authentication.<\/p>\n<p><strong>Recommendation:<\/strong> Block legacy authentication entirely through Conditional Access policies. First identify devices and applications still using legacy protocols, and update them.<\/p>\n<h3>3. Overprivileged Accounts<\/h3>\n<p>In many SME tenants, too many users hold the &#8220;Global Administrator&#8221; role. Every global administrator account is a highly attractive target for attackers. In the worst case, compromising a single account is enough to take over the entire M365 environment.<\/p>\n<p>Typical problems:<\/p>\n<ul>\n<li>The CEO is a Global Admin &#8220;because they need to see everything&#8221;<\/li>\n<li>The IT service provider has a permanent Global Admin account instead of time-limited access<\/li>\n<li>Former employees still have active administrator accounts<\/li>\n<li>Service accounts with administrator rights and weak passwords<\/li>\n<\/ul>\n<p><strong>Recommendation:<\/strong> Reduce Global Admins to a maximum of two to three emergency accounts (break-glass accounts). Use role-based administration: an Exchange administrator does not need SharePoint rights. Enable Privileged Identity Management (PIM) to grant administrator rights only on demand and with time limits.<\/p>\n<h3>4. SharePoint and OneDrive Configured Too Openly<\/h3>\n<p>SharePoint Online and OneDrive for Business are powerful collaboration tools. But the default configuration is often too permissive:<\/p>\n<ul>\n<li><strong>&#8220;Anyone&#8221; links:<\/strong> Documents can be shared with anonymous links that require no login. Once shared, control is lost.<\/li>\n<li><strong>External sharing:<\/strong> By default, users can share documents with external parties. Without policies, this happens in an uncontrolled manner.<\/li>\n<li><strong>Excessive permissions:<\/strong> Entire SharePoint sites are shared with &#8220;Everyone in the organisation&#8221; even though only one team needs access.<\/li>\n<li><strong>No Data Loss Prevention:<\/strong> Sensitive data such as customer lists, contracts, or financial data is stored and shared without protection.<\/li>\n<\/ul>\n<p><strong>Recommendation:<\/strong> Restrict external sharing to authenticated users. Disable &#8220;Anyone&#8221; links or limit their validity period. Regularly review who has access to which SharePoint sites.<\/p>\n<h3>5. Missing Monitoring and Logging<\/h3>\n<p>M365 offers comprehensive audit logs, but many SMEs do not use them. Without monitoring, suspicious activities go undetected:<\/p>\n<ul>\n<li>Sign-ins from unusual countries<\/li>\n<li>Mass downloads of documents<\/li>\n<li>Creation of mail forwarding rules (a classic attacker trick)<\/li>\n<li>Changes to administrator roles<\/li>\n<li>New OAuth app permissions<\/li>\n<\/ul>\n<p><strong>Recommendation:<\/strong> Enable the Unified Audit Log. Configure alerts for suspicious activities. Even without a SIEM system, the built-in M365 alerts can detect many threats.<\/p>\n<h3>6. Email Security Not Optimised<\/h3>\n<p>Exchange Online offers Exchange Online Protection (EOP) as baseline protection. But the default configuration is often insufficient:<\/p>\n<ul>\n<li>SPF, DKIM, and DMARC are not configured or are incomplete, enabling email spoofing<\/li>\n<li>Anti-phishing policies use default settings instead of tailored rules<\/li>\n<li>Safe Links and Safe Attachments (Defender for Office 365) are not enabled<\/li>\n<li>Users can execute macros in Office attachments<\/li>\n<\/ul>\n<p><strong>Recommendation:<\/strong> Configure SPF, DKIM, and DMARC for all your domains. Tighten the anti-phishing policies. Block macros in email attachments via group policies.<\/p>\n<h2>Cloud Security and Vulnerability Scanning<\/h2>\n<p>Traditional vulnerability scanning primarily targets on-premise systems: servers, network devices, endpoints. But in a cloud-first world, cloud services must also be incorporated into the security strategy.<\/p>\n<p>Even though the M365 platform itself is patched by Microsoft, there are areas where external scanning remains relevant:<\/p>\n<ul>\n<li><strong>Hybrid environments:<\/strong> Many SMEs operate hybrid setups with on-premise Exchange and Exchange Online, Active Directory and Azure AD, or local file servers and SharePoint Online. The on-premise components still need to be scanned.<\/li>\n<li><strong>Cloud-exposed services:<\/strong> Even in an M365 environment, there are often still local web servers, VPN gateways, and other exposed services that are vulnerable.<\/li>\n<li><strong>DNS and domain configuration:<\/strong> Missing SPF\/DKIM\/DMARC records, dangling DNS records, or exposed subdomains are risks that an external scan can detect.<\/li>\n<li><strong>OAuth applications and integrations:<\/strong> Third-party apps connected to M365 expand the attack surface. Every app with extensive permissions is a potential risk.<\/li>\n<\/ul>\n<h2>A Pragmatic M365 Security Check<\/h2>\n<p>For SMEs looking to improve their M365 security, here is a prioritised checklist:<\/p>\n<ol>\n<li><strong>Enable MFA for all users<\/strong> &#8212; highest impact, immediately actionable<\/li>\n<li><strong>Block legacy authentication<\/strong> &#8212; closes one of the biggest gaps<\/li>\n<li><strong>Reduce Global Admin accounts<\/strong> &#8212; minimises the risk of a complete takeover<\/li>\n<li><strong>Restrict external SharePoint sharing<\/strong> &#8212; prevents uncontrolled data leakage<\/li>\n<li><strong>Configure email authentication<\/strong> (SPF, DKIM, DMARC) &#8212; protects against spoofing<\/li>\n<li><strong>Enable audit logging and set up alerts<\/strong> &#8212; enables attack detection<\/li>\n<li><strong>Review Microsoft Secure Score<\/strong> &#8212; Microsoft&#8217;s own assessment tool shows improvement potential<\/li>\n<li><strong>Scan on-premise systems regularly<\/strong> &#8212; don&#8217;t forget the hybrid attack surface<\/li>\n<\/ol>\n<h2>ExposIQ for Your Cloud Era<\/h2>\n<p>The shift to the cloud changes the threat landscape but does not make vulnerability management obsolete &#8212; quite the opposite. The attack surface becomes more complex: cloud services, on-premise systems, hybrid connections, and third-party integrations must all be considered.<\/p>\n<p>ExposIQ helps Swiss SMEs maintain oversight. External scanning checks your publicly accessible systems and services &#8212; whether on-premise or cloud-exposed. With over 35 scan engines and 64&#8217;000 CVEs, vulnerabilities in web servers, VPN gateways, mail configurations, and other exposed services are detected. Breach monitoring also alerts you when employee credentials appear in data leaks &#8212; one of the most common causes of M365 account takeovers.<\/p>\n<p>Swiss hosting, nDSG-compliant, from CHF 99 per month. Because cloud migration is only responsible with a clear security strategy: <a href=\"https:\/\/exposiq.ch\/en\/\">exposiq.ch<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Migrating to Microsoft 365 is one of the most common IT projects at Swiss SMEs. Email, document management, collaboration &#8212; all from one provider, all in the cloud. But with the move to M365, a dangerous misconception arises: many companies believe that Microsoft takes care of security. This is only partially true. The Shared Responsibility &#8230; <a title=\"Microsoft 365 and Cloud Security: What SMEs Should Check\" class=\"read-more\" href=\"https:\/\/exposiq.ch\/en\/microsoft-365-and-cloud-security-what-smes-should-check\/\" aria-label=\"Read more about Microsoft 365 and Cloud Security: What SMEs Should Check\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"rank_math_focus_keyword":"microsoft 365 cloud security sme","rank_math_title":"Microsoft 365 and Cloud Security: What SMEs Should Check","rank_math_description":"Migrating to M365 does not mean Microsoft handles your security. Shared responsibility, common misconfigurations and what SMEs should check.","rank_math_robots":"","rank_math_canonical_url":"","rank_math_primary_category":"","footnotes":""},"categories":[8],"tags":[],"class_list":["post-1188","post","type-post","status-publish","format-standard","hentry","category-it-sicherheit","generate-columns","tablet-grid-50","mobile-grid-100","grid-parent","grid-33"],"_links":{"self":[{"href":"https:\/\/exposiq.ch\/en\/wp-json\/wp\/v2\/posts\/1188","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exposiq.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exposiq.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exposiq.ch\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exposiq.ch\/en\/wp-json\/wp\/v2\/comments?post=1188"}],"version-history":[{"count":0,"href":"https:\/\/exposiq.ch\/en\/wp-json\/wp\/v2\/posts\/1188\/revisions"}],"wp:attachment":[{"href":"https:\/\/exposiq.ch\/en\/wp-json\/wp\/v2\/media?parent=1188"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exposiq.ch\/en\/wp-json\/wp\/v2\/categories?post=1188"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exposiq.ch\/en\/wp-json\/wp\/v2\/tags?post=1188"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}