Your Trusted IT Advisors
0800 622 348
Remote Support Help
IT Blog
Contact Us
Home
Company
Our Clients
IT Services
Managed IT
IT Support
Cyber Security
Cloud Services
Leasing
VoIP
Microsoft 365
Email Services
All Services
Industries
Managed IT Services for
Professional services
Managed IT Services
for Law Firms
Managed IT Services
for Engineering Firms
Managed IT Services
for Small Businesses
Managed IT Services for
Accounting Firms
Managed IT Services for
Building And Constructions
Now Hiring:
IT Support Engineer
Home
Company
Our Clients
IT Services
Managed IT
IT Support
Cyber Security
Cloud Services
Leasing
VoIP
Microsoft 365
Email Services
All Services
Industries
Managed IT Services for
Professional services
Managed IT Services
for Law Firms
Managed IT Services
for Engineering Firms
Managed IT Services
for Small Businesses
Managed IT Services for
Accounting Firms
Managed IT Services for
Building And Constructions
Testing
Please enable JavaScript in your browser to complete this form.
Please enable JavaScript in your browser to complete this form.
-
Step
1
of 11
Microsoft 365 Secuirty Features Implementation Form
Name
*
EMAIL ID
*
Next
If you Want to Change your Phase
Select Your Current Phase
Identity & Access Management
Device Security & Administration
Browser & Application Security
Collaboration & Communication Security
Email & Data Security
Office Desktop App Security
Defender & Windows Security
Compliance & Updates
BYOD Policies
Identity & Access Management
1- Configuration of MFA using Microsoft Authenticator for all users
Yes
No
Do you want to configure MFA for all users?
Note
2- Prevent users from joining devices to Entra ID
Yes
No
Do you want to prevent users from joining devices to Entra ID?
Note
3- Prevent users from enrolling devices to Microsoft Intune
Yes
No
Do you want to prevent users from enrolling devices to Microsoft Intune?
Note
4- Entra ID Joining and Profile Migration
Yes
No
Do you want to enable Entra ID joining and profile migration?
Note
5- AutoPilot Configuration
Yes
No
Windows Autopilot simplifies device setup, configuration, reset, repurposing, or wiping.
Note
6- Endpoint Manager Device Registration
Yes
No
For devices previously joined to Entra but not enrolled in Intune
Note
7- Block Legacy Authentication
Yes
No
Enhances security by disabling older, less secure authentication protocols.
Note
8- Enable Self Service Password Reset
Yes
No
Allows users to reset passwords without IT intervention.
Note
9- Password-less Sign-In for MS Cloud Apps
Yes
No
Configure policies for signing in without a password using Microsoft Authenticator.
Note
10- Enable Device-Based Conditional Access Policies
Yes
No
Enforce access based on device compliance and security posture.
Note
Notes and Feedback
Previous
Next
Device Security & Administration
1- Activate BitLocker for Enhanced Device Security
Yes
No
Encrypts data on devices; BitLocker keys will be stored in Office 365.
Note
2- Configure Windows Local Administrator Password Solution (LAPS)
Yes
No
Manages local administrator passwords securely.
Note
3- Configuration of a Local Administrator for Devices
Yes
No
Option to create an Office 365 admin account for device-specific credentials that rotate every 30 days.
Note
4- Deactivation of All Local Administrators
Yes
No
Prevents elevation of privileges; note: does not apply to BYOD devices.
Note
5- Implementation of Best Practice Security Baseline Policies for Windows (Test Group)
Yes
No
Roll out baseline policies first to a test group (please provide 5 test user emails) before organization-wide deployment.
Note
6- Company Portal Application Configuration
Yes
No
Configure the portal so users can install/uninstall approved applications.
Note
7- List of Installed Applications Currently in Use
Yes
No
Provide a list of applications (e.g., Adobe Reader, Chrome, VLC) for reference.
Note
Notes and Feedback
Previous
Next
Browser & Application Security
1- Implementation of Best Practice Security Baseline Policies for Microsoft Edge
Yes
No
Set policies for browsers and other applications.
Note
2- Block Internet Explorer on Devices
Yes
No
Prevent use of outdated browser technology.
Note
3- Change Default Search Provider in Microsoft Edge to Google (from Bing)
Yes
No
Note
4- Disable Option to Save Passwords in Google Chrome
Yes
No
Enhances security by reducing password storage risks in personal accounts.
Note
5- Disable Option to Clear History in Google Chrome
Yes
No
Note
6- Disable Option to Save Passwords in Microsoft Edge
Yes
No
Note
7- Disable Option to Clear History in Microsoft Edge
Yes
No
Note
8- Show a Message Regarding Company Policy Before Logon
Yes
No
Provide a simple text message for display (formatting will be ignored).
Note
Notes and Feedback
Previous
Next
Collaboration & Communication Security
1- Office 365 Guest Settings – Organisation Wide
Yes
No
Configure who can invite guests and set collaboration restrictions.
Note
2- Configure External Access in Teams
Yes
No
Options: Allow all external domains, allow only specific domains, block specific domains, or block all.
Note
3- Configure Guest Access in Teams
Yes
No
Enable or disable guest access (requires proper Office 365 guest settings).
Note
4- Teams Presenter and Screen Sharing Settings
Yes
No
Define who can present (Everyone, organisers only, etc.) and set screen sharing options (Entire Screen, Single Application, or None).
Note
5- Configure Ability for Participants to Give or Request Control
Yes
No
Enable or disable control sharing during meetings for both internal and external users.
Note
6- Disable 3rd Party & Custom Apps in Teams
Yes
No
Only allow Microsoft apps while restricting external apps.
Note
7- Disable Third-Party Cloud Storage in Teams
Yes
No
Specify allowed providers (e.g., Dropbox, Google Drive) if any.
Note
Notes and Feedback
Previous
Next
Email & Data Security
1- Activate and Configure Microsoft Anti-Threat Protection for Email
Yes
No
Users receive notifications when an email is quarantined, with options to allow, block, or release.
Note
2- Customize Quarantine Permissions and Policies
Yes
No
Allow users to request the release of lower-risk quarantined messages.
Note
3- Block All Executable Email Attachments
Yes
No
Prohibits receipt/execution of attachments with executable file extensions.
Note
4- Configure Safe Links
Yes
No
Protects users from malicious websites by checking URLs in emails/documents.
Note
5- Enable Mail Tips
Yes
No
Provides informative messages during email composition to prevent potential issues.
Note
6- Enable Alert Policies
Yes
No
Alert on suspicious activities (e.g., elevation of privileges, invalid internal recipients).
Note
7- Enable Email Encryption Option
Yes
No
Alert on suspicious activities (e.g., elevation of privileges, invalid internal recipients).
Note
8- Manage User Email Phishing/Junk Reports
Yes
No
Decide if reported messages should be sent to a reporting mailbox or directly reported to Microsoft.
Note
Notes and Feedback
Previous
Next
Office Desktop App Security
1- Implementation of Best Practice Security Baseline Policies for Microsoft Desktop Apps
Yes
No
This includes: Blocking Macros (with an option to exclude Excel if needed) Disabling older Office file formats Enabling Protected View for files from untrusted locations Blocking unsafe files with executable content Disabling trusted network locations Legacy JScript blocking Enforcing file extension matching Blocking Excel XLL add-ins from untrusted sources
Note
2- Sensitivity Labels
Yes
No
Define labels (Public – No Restriction, Public – View Only, Internal, Confidential, Restricted) and specify users for sensitive labels.
Note
Notes and Feedback
Previous
Next
Defender & Windows Security
1- Configuration of Defender to Work with Intune
Yes
No
Focus on endpoint protection and advanced threat management.
Note
2- Security Policy for Windows Firewall
Yes
No
Focus on endpoint protection and advanced threat management.
Note
3- Defender Notifications & Alerts
Yes
No
Specify an email ID to receive notifications.
Note
4- Configuration of Defender Policies
Yes
No
Note
5- Configuration of Defender Tamper Protection
Yes
No
Note
6- Configuration of Attack Surface Reduction Rules
Yes
No
Note
7- Activation of Credential Guard
Yes
No
Note
8- Defender Web Content Filtering Setup
Yes
No
Note
9- Block USB Drives Read and Write Access for Specific Users
Yes
No
Provide the email addresses for the users this policy should apply to.
Note
10- Optional: Make USB Drives Read-Only for Specific Users
Yes
No
Users in read-only mode can transfer files from USB to computer (allowed) but not vice versa.
Note
11- Activation of Windows Defender and Removal of Sophos
Yes
No
Users in read-only mode can transfer files from USB to computer (allowed) but not vice versa.
Note
Notes and Feedback
Previous
Next
Compliance & Updates
1- Configure Default Compliance Policy Settings
Yes
No
Use default settings (minimum OS version, threat level, etc.) with actions for noncompliance.
Note
2- Setup Compliance Notifications
Yes
No
Note
3- Create Compliance Policies for Each Platform
Yes
No
Note
4- Configure Enterprise State Roaming (Deprecated)
Yes
No
Sync user settings (theme, taskbar, wallpaper, etc.) with Microsoft Entra ID.
Note
5- Use Configuration Analyzer for EOP and Defender for Office 365
Yes
No
Compare current email protection settings to Microsoft recommendations.
Note
6- Hardening of Conditional Access Policies
Yes
No
Note
7- Configure Windows Update Rings Policy
Yes
No
Set up two rings: Test Group (Ring 1) and all other users (Ring 2). Specify weekly install day and time.
Note
8- Configure Windows Feature Updates Policy
Yes
No
Manage yearly Windows version upgrades (manual updates with each Microsoft release).
Note
9- Configure Windows Quality Updates Policy
Yes
No
Regular check for critical quality updates (manual for unmanaged environments).
Note
10- Configure Windows Driver Updates Policy
Yes
No
Option to automatically or manually approve driver updates.
Note
11- Configure Update Policy for Office Apps
Yes
No
Manage yearly Windows version upgrades (manual updates with each Microsoft release).
Note
12- Miscellaneous Security Recommendations
Yes
No
Manage yearly Windows version upgrades (manual updates with each Microsoft release).
Note
Notes and Feedback
Previous
Next
BYOD Policies
1- Policy for Personal Computers (BYOD) to Access Company Data
Yes
No
Access will be restricted to web access only (e.g., via Microsoft Edge with a work profile).
Note
2- Policy for Personal Mobiles and Tablets (BYOD) to Block Access via Third-Party Email Apps
Yes
No
Only Microsoft Outlook will be allowed; other email apps (e.g., Apple Mail, Samsung Mail) will be blocked.
Note
3- Policy for Personal Mobiles and Tablets (BYOD) to Access Company Data
Personal or company-owned devices with data sharing protection, allowing only Microsoft apps with app protection policies.
Company-owned devices managed via Intune MDM (with additional charges and strict provisioning).
Note
Notes and Feedback
Task status
*
----Select----
Queued
In Progress
Waiting for Verification
Completed
Get notified about status update
*
Note* : Don't forget to save and continue before leaving this form otherwise your progress wont be saved
Previous
Submit
Get notified about status update
*
Note* : Don't forget to save and continue before leaving this form otherwise your progress wont be saved
Submit
Search for:
Home
Company
About Us
Our Clients
IT Services
Managed IT
IT Consultancy
Cloud Computing
Computer Leasing
Cyber Security
Microsoft 365
VoIP Configuration
All Services
IT Blog