A non-technical checklist to quickly spot common M365 risks.
A quick checklist to identify “default mode” M365 risks. It doesn’t replace a full review, but it reliably finds the common problems.
| Check | What good looks like | Status | Notes |
|---|---|---|---|
| MFA enforced for all users | Everyone uses MFA; admins have stronger MFA | ☐ | |
| Admin accounts separated | No daily-use admin accounts; least privilege | ☐ | |
| Mailbox forwarding rules | No unexpected forwards to external addresses | ☐ | |
| Risky sign-in alerts | Alerts enabled and monitored | ☐ | |
| External sharing controls | SharePoint/OneDrive sharing is intentional, not open | ☐ |
| Question | Why it matters |
|---|---|
| Are we blocking legacy authentication? | Stops a common path for password-spraying and basic takeover. |
| Do we alert on new inbox rules and external forwards? | Attackers often hide in forwarding rules. |
| Do admins use separate accounts and stronger MFA? | Admin takeover is catastrophic. |
| Do we have an M365 backup strategy? | Recycle bin isn’t the same as recoverability. |
No hard sell - just clarity and practical next steps.
hello@virtusgroup.biz