Does this sound familiar? Your organisation has invested heavily in Microsoft 365 security. You’ve enabled Microsoft Defender. You’ve configured Conditional Access policies. You’ve rolled out sensitivity labels and Data Loss Prevention (DLP). Multi-factor authentication is mandatory.
So, why doesn’t your environment feel more secure?
The answer might surprise you: security tools don’t actually create security. They enable it, people and processes are what make security real.
We work across industries like banking, government, healthcare and construction, where protecting information is critical. And time after time, we see the same thing, teams focus on deploying tools instead of strengthening the foundations that make those tools effective.
In this blog we unpack why that happens, and what actually makes Microsoft 365 environments secure.
Here’s a common scenario.
A data breach hits a competitor. Executives panic and IT is told to “lock down” Microsoft 365. The team moves fast by enabling new features, tightening access, and turning on every alert possible.
Six months later, the environment looks more secure, and technically has more controls, but everyday work has become harder:
The tools are running and the dashboards show “protected” status. But, is the organisation actually more secure? Spoiler alert: Not really! Because without foundations, tools are just… tools.
The tools are important, but they only work when the right foundations are in place. Real security starts with how your organisation thinks about, manages and responds to risk, not just with what’s been turned on in the admin centre. Here are five foundations to put in place that make the biggest difference.
Before you can protect data, you need to define what needs protecting and why. What’s the difference between “Internal” and “Confidential”? Who determines classification? How does classification relate to access controls?
DLP policies are only as good as the classification scheme they enforce. Without a clear, business-aligned framework, DLP becomes guesswork – either too restrictive (blocking legitimate work) or too permissive (failing to protect what matters).
Security tools automate enforcement, but they need something to enforce. Who can share externally? What data can leave the organisation? What apps are approved for business use? How do we handle guest access?
These aren’t technical questions – they’re business decisions that need governance frameworks. Tools like Conditional Access and external sharing controls can’t make these decisions for you; they can only enforce decisions you’ve already made.
When Defender flags a suspicious email, who investigates? When someone requests access to sensitive data, who approves? When a DLP policy blocks a document, how do users escalate?
Security tools generate events and alerts. Without processes to handle them, they just create noise. Without a process, the most sophisticated monitoring in the world is worthless because no one knows what to do with the alerts.
The uncomfortable truth is that the most common security failure isn’t technical, it’s human. It often comes down to people. Users click phishing links, misclassify documents, share inappropriately, or work around controls that seem unnecessarily restrictive.
This isn’t because users are careless. It’s because they haven’t been brought along on the security journey. They don’t understand why security matters, what they’re protecting, or how to work securely. They see security as an obstacle to their work, not an enabler of it.
The most effective security is embedded into business processes, because security works best when it’s built into the way people already work, not bolted on afterward. When people can collaborate securely without friction, they will. When security creates unnecessary obstacles, they’ll find workarounds – and those workarounds are usually less secure than doing nothing.
Let’s look at a different scenario:
An organisation is preparing to deploy Microsoft 365 Copilot. Before turning it on, they take a different approach by ensuring governance and management first:
Now when they deploy Copilot, the security tools work. DLP doesn’t block legitimate work because the classification is clear. Labels get applied because people understand them, and alerts get handled because there are processes in place.
What you can see here is the tools are the same as above, but the outcome is completely different. The key difference? In this scenario they built their foundation before they applied the tools over the top.
Microsoft 365 is evolving rapidly. Copilot, and generative AI as a whole, is fundamentally changing how people work with information within the Microsoft 365 ecosystem. Regulatory requirements are tightening.
As we mentioned, organisations that built their M365 security on tools alone are discovering that foundation is shaky. As capabilities expand and risks evolve, the gaps become more apparent and more dangerous.
The good news is, it’s never too late to build the foundation, it just requires a shift in thinking.
So, we end this blog with some parting words of wisdom:
Stop asking “what security tools should we deploy?”
and instead, start with “what security outcomes do we need, and what foundations will deliver them?”
At Engage Squared, we help organisations build the foundations that make Microsoft 365 security work, from information governance and classification frameworks to policies, to adoption programs and strategic assessments.
We’re also proud to have been recognised by Microsoft as a Solutions Partner for Security, an acknowledgement of our proven expertise in helping organisations protect their people, data and systems.
If you’re looking to strengthen your security posture or just want to know where to start, get in touch with our team today.
Andrew Nathan is a Principal Information Security Consultant at Engage Squared. He helps organisations turn Microsoft 365 security tools into real security outcomes through practical governance, data protection, and user-centric adoption.
Before joining Engage Squared, Andrew led Security for Microsoft FastTrack for Azure in the Americas and served eight years in the Australian Army, including time in Special Forces. He holds a Master of Business Administration and a Bachelor of Science in Information Technology and is a Certified Information Systems Security Professional (CISSP).