• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • MARKETS & PRODUCTS
    • Markets


      Construction

      Cybersecurity

      Fixed Gas & Flame Detection

      General Industry

      Healthcare

      HVAC-R

      Oil & Gas

      Training

      Utilities

      Products


      Combustion Analysis

      Confined Space

      Connected Work

      Corporate

      Fall Protection

      Fixed Gas & Flame Detection

      Gas Analysis

      General

      Head Protection

      Heat Stress

      Leak Detection

      Portable Gas Detection

      Refrigerant Analysis

      Respiratory Protection

      Column
  • SUBSCRIBE

Securing Your Office Email Environment

2 Min Read | Apr 2, 2024

Reading Time: 2 minutes This month we will delve into enhancing the security of an office email environment.

April 2, 2024 by Melina Mangino

Reading Time: 2 minutes
MSA Cyber Security

Last month we reviewed Third Party Risk Management and emphasized the importance of understanding the potential risks associated with basic business processes. This month we will delve into enhancing the security of an office email environment.

Protecting Microsoft Office

Microsoft Office offers extensive control of the platform and how it is configured. Microsoft has made preconfigured security settings available to all users, recognizing that 99.9% of common identity-related attacks can be stopped by implementing Multi-Factor Authentication (MFA) and blocking legacy authentication.

  • Enforce O365 Security defaults
    • Forces MFA for all accounts
    • Requires all administrators to use MFA
    • Blocks legacy protocols
    • Enforce Conditional Access whenever possible
  • Review your SPF, DKIM, and DMARC settings. Correctly configurating these settings will offer more protection against spoofing and phishing, safeguarding your brand.
  • Review this site for proven PowerShell commands that will provide a greater insight into your tenant configurations –  Security Archives – Office 365 Reports

Additional resources for securing Office365.

  • GitHub – T0pCyber/hawk: Powershell Based tool for gathering information related to O365 intrusions and potential Breaches

PowerShell Based tool for gathering information related to O365 intrusions and potential breaches.

  • GitHub – cisagov/Sparrow: Sparrow.ps1 was created by CISA’s Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 environment.

Sparrow was created by CISA’s Cloud Forensics team to help detect possible compromised accounts and  applications in the Azure/m365 environment.

  • GitHub – cammurray/orca: The Microsoft Defender for Office 365 Recommended Configuration Analyzer (ORCA)

The Microsoft Defender for Office 365 Recommended Configuration Analyzer (ORCA)

  • GitHub – cisagov/ScubaGear: Automation to assess the state of your M365 tenant against CISA’s baselines

Automation to assess the state of your M365 tenant against CISA’s baselines – Secure Cloud Business Applications (SCuBA) Project | CISA

A few caveats on the sites above:

  • Before implementing any of the scripts, carefully review them to determine their relevance to your specific tenant(s).  Some scripts may require or expect M365 licensing that is not owned.  As with any script, you must review the install guides.
  • It is strongly recommended to test these scripts in a non-production environment before deploying.
  • Keep in mind that the scripts provided above won’t necessarily fix existing issues. Instead, they offer valuable insights into your M365 tenant, aligning with Microsoft’s best practices and indicators of compromise.

Protecting Gmail Suite

  1. Protect your business with 2-Step Verification – Google Workspace Admin Help
  2. Advanced phishing and malware protection – Google Workspace Admin Help
  3. Prevent phishing attacks on your users – Google Workspace Admin Help
  4. Run a security checkup

Additional resources

Tips to Stay Safe & Secure Online – Google Safety Center

Recommended for You

Cybersecurity

Communicating Information Security Goals

February 1, 2024
2 Min Read
Cybersecurity

Plan for a Secure New Year

January 1, 2024
< 1 Minute Read
Cybersecurity

Building a Third Party Risk Management Program

March 1, 2024
2 Min Read
Cybersecurity

Social Engineering Awareness

May 1, 2024
< 1 Minute Read
Share:

Footer

MSA MISSION: That men and women may work in safety and that they, their families, and their communities may live in health throughout the world.

MSASafety.com

  • Construction
  • General Industry
  • Oil & Gas
  • HVAC-R
  • Utilities
  • Fixed Gas & Flame Detection
  • Fire Service
MSA on Facebook   MSA on X   MSA on Instagram   MSA on LinkedIn   MSA on YouTube  

Contact

  • blog@msasafety.com
  • 1-800-672-2222
  • View All Contact Info
  • Subscribe

Other MSA Blogs

  • Fire Service – The Scene
  • FieldServer – The Safety Connection

© 2024 MSA. All rights reserved.

© 2025 MSA . All rights reserved.

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT