01. Architecture & Functionality
Unlike the rigid "Security Defaults" (On/Off), BSM is a Configuration Overlay. Found under M365 Admin Center > Settings > Org settings > Security & privacy, it acts as an orchestrator.
When you activate BSM, the service executes Graph API calls in the background to change settings across various workloads:
- Entra ID: Creates/activates Conditional Access Policies (with naming schema Microsoft managed: ...).
- Exchange Online: Sets Set-OrganizationConfig parameters.
- SharePoint/Teams: Modifies sharing settings.
02. Comparison: BSM vs. Security Defaults vs. Custom CA
Where does BSM fit in? Here's the decision matrix for architects:
| Feature | Security Defaults | Baseline Security Mode | Custom CA (Flowbotics) |
|---|---|---|---|
| Licensing | Free / Basic | Business Premium / E3+ | Business Premium / E3+ |
| Flexibility | None (All or nothing) | Medium (Exclusions possible) | Maximum (Granular) |
| Legacy Auth | Blocks everything | Blocks (with Impact Report) | Granular controllable |
| Target Group | Micro-Business (< 10 users) | SMEs without IT Security team | Enterprise & Regulated |
03. Policy Inventory (Technical)
Microsoft documents "roughly" what happens. Here's the technical reality of what gets changed in the tenant:
A. Identity & Access (Entra ID)
- MFA Enforcement: Enforces MFA for all admin roles (Global, Security, Exchange, SharePoint, Helpdesk).
- Legacy Authentication: Blocks protocols that don't support MFA. Technically: CA Policy blocking clients like ExchangeActiveSync, OtherClients.
- Admin Protection: Enforces phishing-resistant MFA (FIDO2/Certificate) for High-Privilege Roles (optionally activatable).
B. Exchange Online Protection
- External Forwarding: Sets AutoForwardingMode on RemoteDomains to Off or SystemManaged.
- Malware Filter: Activates "Common Attachment Types Filter" (Blocks .exe, .vbs, .ps1).
- SMTP Auth: Disables SmtpClientAuthenticationDisabled globally at tenant level (exceptions must be set per mailbox).
C. Office & Apps Hardening
This is the part that's often overlooked. BSM sets security standards for the apps themselves:
- Macros: Sets policies to block macros from the internet (Mark-of-the-Web).
- DDE: Disables Dynamic Data Exchange (popular malware attack vector in Excel).
- OLE: Blocks activation of OLE objects in Office.
04. The Killer Feature: Impact Analysis
The biggest risk with security hardening is the "Scream Test" (We turn it off and wait who screams). BSM integrates an Impact Analysis Engine.
Before a policy becomes active, BSM scans the Sign-In Logs and Mail-Flow-Logs of the last 30 days.
05. Risks for Enterprise Tenants
Why we at Flowbotics remain cautious in enterprise environments:
- Black Box Policies: The Microsoft-managed CA policies often can't be edited. If you have complex "Break Glass" account logic, BSM might overwrite or ignore it.
- Conflicts: If you already have your own CA policies (e.g., "Block Legacy Auth except IP x.x.x.x"), BSM can lead to unexpected overlaps.
- False Sense of Security: BSM covers the "baseline". It doesn't replace a Zero Trust architecture with Device Compliance, Sensitivity Labels and Data Loss Prevention.
06. Audit Script: Are You Ready for BSM?
Before flipping the switch, you should know if your environment is "clean". This script checks the most critical factor: Active Legacy Authentication.
# Prerequisites: Install-Module Microsoft.Graph.Reports
Connect-MgGraph -Scopes "AuditLog.Read.All"
# Period: Last 30 days (Maximum for Interactive Logs via Graph)
$StartDate = (Get-Date).AddDays(-30).ToString("yyyy-MM-dd")
Write-Host "Analyzing Sign-Ins for Legacy Protocols (POP/IMAP/SMTP)..."
$LegacySignIns = Get-MgAuditLogSignIn -Filter "createdDateTime ge $StartDate and clientAppUsed eq 'Legacy Authentication'" -All
if ($LegacySignIns.Count -gt 0) {
$LegacySignIns | Group-Object UserPrincipalName, AppDisplayName |
Select-Object Name, Count |
Sort-Object Count -Descending |
Format-Table -AutoSize
Write-Warning "WARNING: Legacy Auth found! BSM would block these connections."
} else {
Write-Host "Clean! No Legacy Auth activity found."
}
Unsure whether BSM or Custom Policies are right for you?
Book Architecture Review