ArtikelRahmen V5 MS365

Your guide to security, compliance, and governance

Here you can find out how to configure your tenant not only productively, but also securely and GDPR-compliant. We’ll walk you through the latest best practices, from global organization settings to the depth of each service.

🆕 Last update on 25.12.2025 | As the cloud is constantly changing, we are constantly reviewing this guide. Nevertheless, a look at the official Microsoft documentation is mandatory to stay up to date with critical changes.

Organization Settings


Basic Settings & Organization

Before you roll out individual tools, the foundation must be right. These global settings determine the security level of your entire environment.

Microsoft 365 admin center | Guide to Organization Settings

Services


Don’t blindly trust default values. Use the principle of “privacy by design” to make your environment GDPR-compliant. By minimizing data by default—such as pseudonymizing usernames in reports—and disabling unnecessary “connected experiences,” you actively minimize risk.

👉 Organization Settings – SERVICES

Security and privacy


Who is allowed to see what? Define granular access rights to keep sensitive data protected. Also enable audit logs. They make access traceable and, in the event of an emergency, are your most important proof of compliance with auditors.

👉 Organization Settings – Security Privacy

Organization Profile


Your organization profile is the legal imprint of your client. Always keep master data and technical contacts (e.g. for data protection requests) up to date. This not only ensures that Microsoft can be reached in the event of incidents, but is also part of your due diligence obligation under the GDPR.

👉 Organization Settings – Organization Profile

Privacy in the Services


Unbenannt 1

The fundamental safety framework is in place – but this is only the beginning. Now that the global guidelines have been set, we dive deep into the individual specialist applications.

Whether Microsoft Teams, SharePoint or Entra ID: Each service has its own architecture, specific admin centers and individual pitfalls that are often not covered by general guidelines. At this point, it is decided in detail how safe and productive your users really work in everyday life.

🔐 Microsoft Entra ID


Identity is the new firewall. Entra ID controls who is allowed through the door at all.

  • Cooperation between clients: Secure B2B scenarios. Use cross-tenant access settings to control exactly which external companies you exchange data with.
  • Directory synchronization: If you drive a hybrid (Entra Connect), pay attention to data economy. Synchronize only the attributes and users that really need to go to the cloud.
  • Data Quality: Outdated accounts are a security risk. Regular access reviews are mandatory.

👉 To the guide: Data protection in Microsoft Entra ID

💬 Microsoft Teams


The center of collaboration – and often the largest data pot.

  • Team Channel Management: Prevent uncontrolled growth. Clearly define who is allowed to create new teams (lifecycle management) so that you don’t have to manage thousands of orphaned data graves.
  • Guest access: Cooperation yes, but controlled. Make sure guests only have access to the bare essentials and need to use MFA.
  • Employee training: Technology is only half the battle. Make your users aware of how to handle chats, file sharing, and recordings.

👉 To the guide: Data protection in Microsoft Teams

📂 Microsoft SharePoint


Here are your documents. Managing permissions is key here.

  • External sharing: The biggest risk. Limit “sharing with anyone” (Anonymous Links) and set expiration dates for external links.
  • Safety Measures: Use Data Loss Prevention (DLP) to block accidental sharing of credit card information or employee numbers.
  • Eligibility check: Regularly check inherited permissions on libraries. “Less is more.”

👉 To the guide: Data protection in Microsoft SharePoint Online

🤖 Microsoft Copilot


AI amplifies everything – including your security gaps. Copilot finds everything the user has access to (oversharing problem).

  • Control data access: Before you turn on Copilot, you’ll need to clean up your permissions (Just Enough Access). Copilot respects existing rights – if these are too broad, the AI sees too much.
  • Safety Measures: Use sensitivity labels. A document marked as “Strictly Confidential” will not be used by Copilot for responses.
  • Protection: Prevent copy-paste errors caused by DLP in the Copilot responses.

👉 Get the guide: Privacy in Microsoft Copilot

🛡️ Microsoft Purview


The command center for your compliance. Here you leave the level of the individual apps and lay a protective net over all your data.

  • Information Protection: Know your data. Use sensitivity labels to classify documents and, if necessary, automatically encrypt them, no matter where they are.
  • Audit eDiscovery: Who did what and when? Make sure that audit logs are stored long enough to remain evidentiary and informative in the event of a data breach or litigation.

👉 To the guide: Data protection with Microsoft Purview

📧 Microsoft Exchange Online


Those who are declared dead live longer. Even in the age of Teams, email remains the number 1 gateway for ransomware and phishing attacks.

  • Protection against attacks: Harden your defenses. Strictly configure anti-phishing and anti-malware policies to protect users from malicious attachments and fake boss emails.
  • Authentication (SPF/DKIM/DMARC): No shipping without ID. Protect your domain reputation from spoofing and make sure your legitimate emails don’t end up in customers’ spam.
  • Deprecated protocols: Close the back doors. Disable Legacy Authentication (IMAP/POP) globally to prevent brute force attacks on passwords.

👉 To the guide: Hardening | Security Privacy Best Practices

Microsoft Documentation


Changelog

DATETYPE OF CHANGE
23.09.2023Publication of the Data Protection Guide
Laying the foundation of the documentation with a focus on secure basic configuration of:
SharePoint Online: Sharing permissions and access protection.
Microsoft Teams: Guidelines for external communication and guest access.
Entra ID: Identity protection and basic security standards.
10.04.2024Update Aktualisierung
Comprehensively review and adapt existing content to Microsoft default settings. Integration of new best practices to harden the environment as well as editorial revision of the data protection notice.
28.09.2024Update Aktualisierung
Check existing content for changed Microsoft settings.
19.03.2025Enhancement: Microsoft 365 Copilot
Added a new chapter on the introduction and validation of AI assistants in the company. Focus: Licensing, requirements for the “Semantic Index” and data protection-compliant provision of Copilot for end users.
01.09.2025Enhancement: Microsoft Purview
Expansion of the documentation to include information protection, configuration of sensitivity labels and strategies for Copilot Data Loss Prevention (Copilot DLP).
14.09.2025Update Aktualisierung
Harmonizing terminology and updating outdated screenshots due to UI changes in the admin center.
20.12.2025Update Aktualisierung
Checking all linked Microsoft sources for validity. Adapting PowerShell commands to new modules and discontinued features.
21.12.2025Remodeling: Microsoft 365 Data Protection Guide
• Structure and formatting of the Privacy Guide landing page adjusted
25.12.2025Expansion: Microsoft 365 Copilot
Copilot settings in a separate article and expanded.
25.12.2025Enhancement: Exchange Online Hardening
• Implementation of SPF, DKIM DMARC.
• Protection against phishing spoofing (external tagging, anti-spam).
• Hardening of transport routes (SMTP auth shutdown, TLS 1.2).

This post is also available in: Deutsch English

Be the first to comment

Leave a Reply

Your email address will not be published.


*