Top 5 Policy Misconfigurations

Misconfigured policies are one of the easiest ways attackers slip through the cracks — and they’re far more common than most organisations realise. In this video, I break down five of the most common Microsoft 365 policy misconfigurations I see in real‑world environments, explain why they matter, and what to watch out for before they turn into security incidents.

🔐 What I cover in this video:

Geo‑blocking policies in Microsoft Entra – where these often look “secure” but still leave major gaps

Macro blocking with Microsoft 365 Business Premium – common assumptions vs what’s actually enforced

Defender for Office 365 – misaligned policies that weaken email protection

Compliance policies – settings that exist on paper but don’t deliver in practice

SharePoint & OneDrive external sharing – how small configuration choices can create big exposure

This isn’t about theory or best‑case setups, it’s about the mistakes that happen every day, even in well‑managed tenants, and how to think about them from a risk perspective. If you manage Microsoft 365, Entra, or security policies and want to avoid the most common pitfalls, this one’s for you.

Previous
Previous

What is an Adversary in the Middle Attack, can they be prevented?

Next
Next

Why Blocking Macros in M365 Is Simple… Unless You Pay for the Wrong License