When Microsoft 365 security incidents occur, they are often attributed to “sophisticated attacks” or “advanced threat actors”. In reality, the majority of compromises exploit well-known, repeatable misconfigurations that have existed quietly for months or years.

These issues persist not because they are difficult to fix, but because they sit in the gaps between responsibility, ownership, and visibility.

This article outlines the most common Microsoft 365 misconfigurations we encounter, why they matter, and why they are so persistent.

What makes these misconfigurations particularly dangerous is that they often arise in environments managed by capable, well-intentioned teams. They are not the result of ignorance or neglect, but of competing priorities, inherited decisions, and a lack of sustained visibility. Over time, these factors combine to create security gaps that feel normal internally, even as they represent significant exposure externally.

Misconfiguration Beats Zero-Days

Zero-day vulnerabilities attract headlines. Misconfigurations cause breaches.

From an attacker’s perspective, misconfiguration is vastly more attractive than exploiting software flaws. It requires less effort, carries less risk, and scales easily across environments. A single technique can be reused repeatedly against tenants that are configured in broadly similar ways. This predictability is what makes misconfiguration such a reliable entry point.

Attackers targeting Microsoft 365 overwhelmingly prefer:

  • Predictable weaknesses
  • Low-effort access
  • Legitimate authentication paths

Misconfiguration provides all three.

Because misconfigurations do not announce themselves as “broken”, they often escape normal operational scrutiny. There is no failed service, no patch advisory, and no obvious incident to trigger investigation. In many cases, the configuration is working exactly as intended — just not as securely as assumed:

  • Do not trigger patching workflows
  • Rarely generate alerts
  • Are often considered “acceptable risk”

Over time, they become normalised.

Over-Permissive Roles and Privilege Creep

Excessive privilege is one of the most damaging and common issues.

Typical causes include:

  • Emergency role assignments never revoked
  • Broad admin roles used for convenience
  • Service accounts with permanent privilege
  • Poor separation of duties

Privilege creep is rarely the result of a single poor decision. It accumulates incrementally as access is granted to solve immediate problems, support growth, or respond to incidents. Once established, excessive privilege becomes difficult to unwind without disrupting operations or challenging entrenched expectations. This inertia is what allows dangerous access patterns to persist long after their original justification has disappeared.

Once privilege creep sets in, attackers need only compromise a single account to gain extensive access.

Guest Access and External Users

Guest access is essential for collaboration — and a frequent source of exposure.

Common issues include:

  • Guest users excluded from Conditional Access
  • External users granted access beyond business need
  • No lifecycle management or review
  • Poor visibility into guest activity

In many tenants, guest users persist indefinitely, quietly expanding the attack surface.

The risk posed by external users is not limited to what they can access today, but how little visibility organisations retain over time. Guest accounts often fall outside normal user lifecycle processes, meaning they are rarely reviewed, rarely challenged, and rarely removed. As business relationships change, these accounts quietly become detached from their original context, turning collaboration into long-term exposure.

Weak Audit Logging and Retention

Audit data is often misunderstood.

We frequently encounter tenants where:

  • Audit logging is partially enabled
  • Retention is insufficient for investigations
  • Logs are not centralised or reviewed
  • Licensing assumptions prevent full coverage

Weak audit logging does not usually attract attention until something goes wrong. At that point, organisations discover that they cannot reliably answer basic questions about who accessed what, when, and how. Investigations become speculative, incident timelines remain incomplete, and confidence in conclusions erodes. The absence of sufficient audit data turns manageable incidents into prolonged crises.

DLP and Data Protection Gaps

Data Loss Prevention is often deployed optimistically:

  • Broad policies
  • Minimal tuning
  • No validation

As a result, policies generate noise, true data leakage goes unnoticed and alerts are ignored, DLP without operational ownership becomes a compliance artefact rather than a security control.

Data Loss Prevention is particularly vulnerable to this pattern because it sits at the intersection of technology, user behaviour, and business context. Without clear ownership and ongoing tuning, DLP policies either become overly permissive to avoid disruption or overly noisy to the point of irrelevance. In both cases, the control exists in name but fails to meaningfully reduce risk.

Why These Issues Persist

These misconfigurations persist because:

  • Ownership is unclear
  • Security decisions are inherited
  • No one validates assumptions
  • Tooling obscures rather than clarifies

Many of these issues persist because they do not map neatly to team boundaries. Identity, data protection, logging, and external access often span multiple functions, each with partial responsibility but limited end-to-end ownership. In the absence of clear accountability, problems are acknowledged but not resolved, gradually becoming accepted characteristics of the environment.

They are not failures of competence — they are failures of visibility.

Final Thoughts: Familiar Doesn’t Mean Acceptable

The danger of familiarity is that it dulls urgency. When the same misconfigurations are observed repeatedly without immediate consequence, they cease to feel risky. Over time, organisations begin to optimise around them rather than challenge them, embedding insecurity into everyday operations.

The most dangerous Microsoft 365 security issues are not novel. They are familiar, well-documented, and often quietly accepted.

Familiarity breeds comfort, not safety.

What distinguishes mature organisations is not the absence of misconfiguration, but the willingness to surface and challenge it. Independent review turns “this is how it’s always been” into “this is what actually matters”.

Misconfiguration is inevitable. Unchecked misconfiguration is optional.

Want to secure your most critical asset?

Take the next step to securing your organisation

David Morgan

Founder & Consultant

Trusted Microsoft Cloud Security Advisor with 27 years experience | Empowering Businesses to Embrace Cloud Innovation with Confidence

Skills chart of the author David Morgan, high level expertise in Cyber Security, Network Security, Azure, Microsoft 365, Penetration Testing & Breach Attack Simulation

Related Posts