Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportBlogContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR: Identity Threat Detection and Response

    Protect your Microsoft 365 and Google Workspace identities and email environments.

    Managed ITDR: Identity Threat Detection and Response

    Protect your Microsoft 365 and Google Workspace identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training Software

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training Software

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    How Unified EDR and ITDR Stop Attacks Before They Spread
    Huntress Cybersecurity
    How Unified EDR and ITDR Stop Attacks Before They Spread
    Huntress Cybersecurity
    Codex Red: Untangling a Linux Incident With an OpenAI Twist (Part 2)
    Huntress Cybersecurity
    Codex Red: Untangling a Linux Incident With an OpenAI Twist (Part 2)
    Huntress Cybersecurity
    Attackers Didn’t Wait for AI. They Built Workflows Around It.
    Huntress Cybersecurity
    Attackers Didn’t Wait for AI. They Built Workflows Around It.
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Blog
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportBlogContact
Search
Close search
Get a Demo
Start for Free
Home
Cybersecurity Insights
A Practical Guide to Microsoft 365 Phishing Defense

A Practical Guide to Microsoft 365 Phishing Defense

Published: 04/24/2026

Written by: Nadine Rozell

Phishing is still the fastest, cheapest way for attackers to ruin your day. It doesn’t matter how big or small your organization is—if you have a Microsoft 365 mailbox, you are a target.

But here’s the good news: you don't need to buy an expensive E5 license to lock down your environment. This guide is your playbook for hardening Microsoft 365 against credential theft, business email compromise (BEC), and those nasty malware-laced emails. We’ll go over a defense-in-depth strategy that actually works–step-by-step configs, practical authentication tips, and options for layering third-party protection.

Understanding phishing threats in Microsoft 365

Phishing is a cyberattack where adversaries impersonate trusted sources in emails, messages, or calls. While email is still their favorite weapon, don't sleep on SMS (smishing) or voice (vishing). Even Microsoft Teams isn't safe from these tactics.

Here is what you’re likely up against in Microsoft 365:

  • Credential phishing: Stealing usernames and passwords to take over accounts.
  • Business email compromise (BEC): Impersonating executives to trick accounting into "wiring funds ASAP."
  • Clone phishing: Copying a legit message but swapping in a malicious link or attachment.

Because these attacks hack people rather than software, human error is usually the culprit. We've seen too many cases start with a frantic email from a "CEO" demanding a wire transfer. Don't let your organization be the next case study.

Microsoft 365 built-in phishing defense features

Microsoft 365 ships with some solid armor out of the box—but you have to wear it properly.

Exchange Online Protection (EOP) gives you baseline anti-spam and anti-malware coverage for cloud mailboxes. Microsoft Defender for Office 365 adds advanced protection—Safe Links, Safe Attachments, and anti-phishing policies—to detect and block phishing, malware, and zero-day attacks across email and collaboration workloads. See the Microsoft Defender for Office 365 service description and feature overview.

There’s also Spoof Intelligence and anti-phishing capabilities that help detect when external senders are pretending to be your domain or trusted partners, and when messages look like impersonation attempts against specific users or domains. When you tune these protections correctly—using Microsoft’s standard/strict presets or equivalent custom policies—you can see a substantial drop in successful attacks.

Not bad for built-in tools, right?

Configuring Microsoft Defender for Office 365

Okay, let’s get into the weeds. Here is how to configure your settings for maximum impact.

Note: Features like Safe Links, Safe Attachments, and advanced anti-phishing policies require Microsoft Defender for Office 365 Plan 1 or Plan 2, which you can get bundled with certain SKUs (like Microsoft 365 Business Premium or E5) or as add-ons.

Anti-phishing policies to enable

These policies tell Microsoft 365 how angry to get when it sees something suspicious. Go to the Microsoft 365 Defender portal, create or edit your policies, and scope them to all users.

Here is our recommended baseline (aligned with Microsoft and CISA guidance):

Policy AreaRecommended SettingWhy It Matters
Spoof IntelligenceEnable, block high confidence spoofStops fakers from pretending to be you.
User ImpersonationProtect execs, finance, IT; action \= QuarantineTargets BEC attempts mimicking your VIPs.
Domain ImpersonationAdd your domains & high-trust partnersFlags look-alike domains used in fraud.
Mailbox IntelligenceEnable; safety tips onLearns sender patterns to spot weirdness.
ThresholdStart at level 2–3Catches more phish without drowning in false positives.
ActionsQuarantine high confidence phishKeeps the bad stuff out of inboxes.
User ReportingEnable “Report phishing”Lets your users help the fight.

Impersonation and spoof settings like these are explicitly recommended in Microsoft’s anti-phishing docs and CISA’s M365 Defender baseline.

Safe Links and Safe Attachments setup

Think of these as your bomb squad. Safe Links scans URLs to block malicious sites, and Safe Attachments detonates files in a sandbox before they reach the user.

  • Safe Attachments overview
  • Safe Attachments policy configuration
  • Safe Links overview
  • Safe Links policy configuration

Quick setup steps:

  • Safe Attachments: Select Dynamic Delivery so emails arrive fast while attachments are scanned (in supported Exchange Online scenarios), and configure the action to block or quarantine malicious content.
  • Safe Links: Enable time-of-click protection and apply it to email, Teams, and Office apps so links are evaluated when users click them, not just at delivery.

Anti-impersonation and spoof intelligence

To stop those "CEO to CFO" wire fraud scams, you need to tell Defender who your VIPs are. Add your executives and key departments (Finance, HR, IT) to the protected users list and configure domain impersonation for your own domains and critical partners. Quarantine high-confidence impersonation attempts so an admin can review them before any damage is done.

Enhancing phishing defense without E5 licensing

You don't need a fancy E5 license to stay safe. If you're on a Business or E3 plan, you can still build a fortress.

What you can do without E5:

  • Stick to the basics: Use core EOP filtering and rock-solid authentication (SPF/DKIM/DMARC) that’s available across Microsoft 365 subscriptions with cloud mailboxes.
  • Go à la carte:
    • Microsoft 365 Business Premium already includes Defender for Office 365 Plan 1, which gives you Safe Links, Safe Attachments, and anti-phishing features.
    • On plans like Office 365 E3 / Microsoft 365 E3, you can add Defender for Office 365 Plan 1 or Plan 2 only where you need it.
  • Layer up: Bring in third-party email–adjacent security via API integration. Many vendors offer “zero-change MX” models that are super easy to deploy and don’t require you to reroute mail flow; this pattern is also recognized in modern cloud email security guidance.

For details on which security capabilities are in which plans, see Microsoft’s Defender for Office 365 service description and “Why do I need Microsoft Defender for Office 365?” overview.

Layering Microsoft 365 with advanced threat detection

Sometimes, native security needs a boost. Government and enterprise guidance (like CISA’s SCuBA baselines) explicitly assumes you’ll either enable strong Defender for Office 365 protections or pair Microsoft 365 with an equivalent dedicated security tool. Instead of relying on one control to be perfect, you get overlapping coverage that can significantly reduce the odds of a successful phish or BEC.

Why layer third-party security?

  • Better detection: AI and NLP can catch subtle BEC cues, odd payment requests, or wording changes that native filters miss.
  • Centralized visibility: See threats across identities, endpoints, and mailboxes in one place instead of jumping between consoles—matching how modern defenders think about identity-centric attacks.
  • Faster remediation: Automated pullback of malicious messages and guided response workflows save your bacon when seconds count. Defender for Office 365 Plan 2 adds automated investigation and response; many third-party tools (including MDR/ITDR offerings) similarly focus on quick response, not just detection.

Choosing the right advanced detection partner

You've got options here. You can go with Secure Email Gateways (SEGs), API-based Integrated Cloud Email Security (ICES) tools, or full Managed Detection and Response (MDR) offerings that watch your environment around the clock. For organizations that want full-spectrum coverage, MDR is often the most practical route.

Providers like Huntress combine managed endpoint detection and response with managed identity threat detection for Microsoft 365—including coverage of suspicious email behavior like account takeover, malicious inbox rules, and rogue OAuth apps—backed by a 24/7 SOC of human threat hunters who investigate and remediate on your behalf. See:

  • Huntress Managed ITDR for Microsoft 365 identities and email environments
  • Huntress Managed EDR for endpoints
  • Huntress Managed Security Platform overview

Because sometimes, you need a human to catch a human hacker.

Best practices for employee training and simulation

You can have the best firewalls in the world, but if Dave in Accounting clicks a malicious link, you’re in trouble. Security awareness training isn't a "one and done" event—it's a lifestyle.

How to do it right (aligned with Microsoft attack simulation guidance and modern SAT programs):

  • Simulate often: Run short, frequent phishing simulations with rotating lures.
  • Coach, don't shame: Provide targeted coaching for users who click.
  • Reward the wins: Celebrate when someone reports a suspicious email.
  • Measure progress: Track click rates and adjust your training quarterly.

Essential email authentication protocols: SPF, DKIM, and DMARC

This is the holy trinity of email security. If you aren't using these, you're basically leaving your front door unlocked.

  • SPF (Sender Policy Framework): A list of who is allowed to send email for you.
  • DKIM (DomainKeys Identified Mail): A digital signature that proves nobody messed with your email in transit.
  • DMARC: The boss protocol that tells receivers what to do if SPF or DKIM fails.

The setup sequence (high level):

1. Publish SPF: Add your TXT record.

2. Enable DKIM: Turn on signing in the Exchange admin center.

3. Publish DMARC: Start with `p=none` to monitor, then move to `p=quarantine`, and finally `p=reject`.

(Implementation details will depend on your DNS host and provider; Microsoft’s mail flow and authentication docs walk through tenant-specific steps.)

Monitoring, investigation, and incident response

When—not if—something slips through, you need a plan. Don't panic. Follow the workflow.

A simple response workflow, consistent with how both Microsoft and CISA think about account compromise and phishing response:

1. Isolate: Block sign-in for the affected account. Kick them off the network if needed.

2. Reset: Change credentials and kill active sessions (including OAuth sessions if you suspect rogue apps).

3. Investigate: Look for lateral movement or sneaky mailbox rules (like forwarding all email to an external Gmail), unusual logins, or suspicious apps.

4. Purge: Wipe the malicious email from the entire tenant using Defender for Office 365 or equivalent tooling.

5. Restore: Get the user back online and document what happened so you can tune policies and training.

Implementing phish-resistant multifactor authentication

MFA is non-negotiable, folks. But SMS codes? They're weak. Attackers can bypass them with SIM swapping or simple social engineering.

Level up your MFA with approaches recommended across Microsoft identity protection guidance and modern ITDR platforms:

  • Ditch SMS: Move to app-based prompts with number matching.
  • Go hardware: Roll out FIDO2 security keys to high-risk roles (admins, finance).
  • Enforce it everywhere: No exceptions. Everyone gets MFA.

Cost-effective strategies and ROI

Prevention is always cheaper than a breach. One serious incident can easily cost more than your entire annual security budget—for example, the FBI estimates global BEC losses in the tens of billions of dollars, and Huntress’ own BEC-focused research and whitepapers cite $50B+ in losses. By tuning your Microsoft 365 policies, adding strong MFA, and layering in third-party detection where it makes sense, you can drastically reduce risk without blowing the budget.

Simple ROI check:

  • Tuning policies: Low cost, medium/high impact (especially if you enable Microsoft’s standard/strict presets or equivalent settings).
  • SPF/DKIM/DMARC: Low cost, high impact against spoofing and domain abuse.
  • Phish-resistant MFA: Low/medium cost, very high impact across identity and email compromise scenarios.

When to manage defense in-house vs. outsourcing

Can you handle this 24/7? If you have a full security team with time to burn, maybe. But for most, outsourcing to an MSP or MDR provider is the smarter play.

An MDR or ITDR provider gives you a team of experts who monitor your environment around the clock. They hunt threats, investigate alerts, and respond while you sleep. When vetting a partner, ask them the hard questions:

  • How do you stop BEC without payloads?
  • What's your time to remediate?
  • Do you integrate directly with Microsoft 365?

Stay sharp, keep your defenses layered, and don't make it easy for the bad guys.

Frequently Asked Questions

Layer up! Combine tuned native protections (EOP + Defender for Office 365), advanced detection, phish-resistant MFA, and regular employee training.

It's a great baseline. Microsoft 365 Business Premium already includes Defender for Office 365 Plan 1; add additional Defender for Office 365 capabilities or a managed detection service (MDR/ITDR) to cover the gaps, especially for BEC and account takeover.

They check URLs the moment you click them. If the site is bad, you get blocked—even if the email looked safe when it arrived. See the Safe Links overview for details.

Act fast. Isolate the account, reset passwords, check for forwarding rules, and purge the email from the tenant using Defender for Office 365 or equivalent tools. Then, teach them what to look for next time and consider tightening policies or MFA for that user group.

Glitch effectBlurry glitch effect

Protect What Matters

Secure endpoints, email, and employees with the power of our 24/7 SOC. Try Huntress for free and deploy in minutes to start fighting threats.
Try Huntress for Free
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 242k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy