Skip to content

Field note

Defender Office 365 Operations

The hard part of Defender for Office 365 is not finding another dashboard. It is building a rhythm that a real team can keep up: quick daily checks, pattern reviews that lead somewhere, and a monthly cleanup that trims the nonsense back out.

Published05 Mar 2026

Updated2 months ago

Read time4 min · 785 words

AuthorGyorgy Bolyki

Defender for Office 365 is easy to under-operate. The daily, weekly and monthly hygiene is where most tenants quietly fall behind.

The controls go live, the policies look respectable, and everyone assumes the tenant is now "covered". Then the real life part starts. Users report odd mail. Quarantine fills up. Allow entries appear. Someone bypasses something for a supplier. A spoofed executive message slips through because the protected user list never got updated. None of that looks dramatic on day one. Over time, it adds up.

That is why I like a simple operating rhythm. Not a giant SOC process. Just enough structure that the platform stays honest.

Daily: touch the queues that can hurt you quickly

The daily pass should be short and deliberate. This is not a half-day job for a small team.

I would usually look at:

  1. high-severity incidents
  2. high-confidence phishing and malware detections
  3. user-submitted phish
  4. quarantine releases that need judgement
  5. anything targeting finance, leadership or admins

The point of the daily review is not to admire the numbers. It is to catch the things that need a decision while they still matter.

If there are repeated releases for the same sender or repeated user reports for the same pattern, that is already telling you where the next tuning conversation belongs.

Weekly: look for patterns, not just tickets

The weekly review is where Defender stops being reactive and starts becoming useful.

You are no longer asking "what happened today?" You are asking "what keeps happening, and why?"

Weekly review areaWhat to ask
User submissionsAre people reporting genuine phish, or is the signal mostly noise?
Quarantine releasesWhich senders or message types keep causing exceptions?
Impersonation detectionsAre protected users and domains still the right ones?
Spoof and authentication issuesAre SPF, DKIM and DMARC problems causing avoidable friction?
Allow and block entriesWhich ones no longer have a good reason to exist?

That is the level where operational maturity shows up. Not in the marketing phrase, but in whether the same avoidable issue keeps appearing every week.

Monthly: reset the tenant back toward intent

The monthly review is where you deal with drift.

I would expect a monthly pass to cover:

  1. preset policy coverage
  2. Safe Links and Safe Attachments scope
  3. anti-phishing policy settings and protected users
  4. external forwarding position
  5. allow and block entries
  6. reporting workflow health
  7. changes against Microsoft recommended settings
  8. owner sign-off on any standing exceptions

This is also the right time to ask a slightly uncomfortable question: if we built this tenant from scratch today, would we keep all of these exceptions?

Often the honest answer is no.

What to measure without making it performative

Teams love a metric. Fine. Just pick ones that help.

MetricWhy it matters
Unreviewed high-severity incidentsTells you whether the urgent queue is neglected
Standing allow entries without a named ownerShows where control is decaying
User submissions reviewed within target timeTests whether reporting is real
Repeat spoof or impersonation patternsHelps prioritise tuning work
Monthly drift review completedConfirms the cleanup rhythm exists

I would take five honest numbers over thirty decorative ones every time.

What usually breaks the rhythm

Three things usually knock this kind of process off course:

  1. nobody clearly owns it
  2. exceptions get approved faster than they get reviewed
  3. the monthly review gets treated as optional because nothing exploded last month

That last one is the trap. Email security drift rarely announces itself in a dramatic way. It just gets gradually sloppier until a bad message lands at the wrong time.

A lightweight operating model for smaller teams

If you are not running a dedicated security operations function, keep it modest:

  • one named owner for the queue
  • one weekly slot for pattern review
  • one monthly cleanup and recommendation review
  • one simple place to record exceptions and decisions

That is enough to make Defender for Office 365 materially more useful than a set-and-forget deployment.

People sometimes want a big answer here. There is not one. Good email operations usually look quite plain from the outside. The value is that someone notices the quiet signs early and trims the tenant back before those signs turn into an incident.

References

Related notes

Need help mapping this to your own tenant, controls, or assessment timeline?