Related Articles
- Configure Anti-Phishing Policies in Microsoft Defender for Office 365
- Enable and Configure Safe Links Policies
- Enable and Configure Safe Attachments Policies
- Configure Anti-Malware Policies in Microsoft 365
- Configure Spoof Intelligence and Anti-Spoofing Protection in Microsoft 365
- Enable DKIM for Exchange Online
- Disable Legacy Authentication for Exchange Online
- Using Preset Security Policies in Microsoft Defender for Office 365
Using Preset Security Policies in Microsoft Defender for Office 365
Overview
Microsoft Defender for Office 365 provides Preset Security Policies (also known as Default Security Policies) to simplify deployment of recommended protection settings.
These presets automatically configure:
- Anti-Phishing
- Safe Links
- Safe Attachments
- Anti-Malware
- Anti-Spam
Instead of manually tuning dozens of settings, administrators can apply Microsoft-recommended configurations using Standard or Strict protection levels.
If you are searching for:
- Enable default security policies Office 365
- Standard vs Strict Defender policy
- Preset security policies Microsoft 365
This guide explains how they work, differences between Standard and Strict, when to use them, and common misconfigurations.
Why Preset Security Policies Are Important
Many organizations misconfigure security settings because:
- Policies are overly customized
- Defaults are left unchanged
- Security is weakened to reduce user complaints
- Administrators lack time for detailed tuning
Preset policies provide:
- Microsoft-recommended baseline security
- Consistent protection across users
- Reduced configuration errors
- Faster deployment
They are especially useful for organizations without a dedicated security team.
What Are Preset Security Policies?
Preset policies are pre-configured protection templates designed by Microsoft based on threat intelligence and best practices.
There are two primary levels:
- Standard Protection
- Strict Protection
Both automatically configure Safe Links, Safe Attachments, Anti-Phishing, and Anti-Malware settings.
Standard vs Strict Protection
Below is a high-level comparison.
| Feature | Standard Protection | Strict Protection |
|---|---|---|
| Target audience | General users | High-risk users (Executives, Finance, Admins) |
| Anti-Phishing sensitivity | Moderate | High |
| Impersonation protection | Enabled | Enabled (More aggressive) |
| Safe Links enforcement | Enabled | Enabled (No user override recommended) |
| Safe Attachments | Block detected threats | Block with stricter evaluation |
| User ability to bypass warnings | Sometimes allowed | Typically blocked |
| False positive risk | Lower | Higher |
| Security posture | Balanced | Maximum protection |
When to Use Standard Protection
Standard is appropriate when:
- You want broad coverage for all users
- You need a balanced security vs usability approach
- You are starting Defender deployment
- You want to reduce manual policy configuration
Recommended for:
- Most general employees
- Medium-risk departments
When to Use Strict Protection
Strict is recommended when:
- Users are high-value targets
- Executives are frequently impersonated
- Organization has experienced phishing attacks
- Compliance requires stronger enforcement
Recommended for:
- CEO, CFO, CIO
- Finance and payroll teams
- IT administrators
- HR leadership
Strict policies may increase false positives but provide stronger protection.
How to Enable Preset Security Policies
Step 1: Navigate to Preset Policies
-
Go to Microsoft 365 Defender Portal
https://security.microsoft.com -
Navigate to:
Email & Collaboration → Policies & Rules → Threat Policies → Preset Security Policies
Step 2: Select Protection Level
Choose:
- Standard protection
- Strict protection
Click Manage protection settings
Step 3: Assign Users
Define:
- All users
- Specific groups
- Individual users
Best practice:
- Apply Standard to all users
- Apply Strict to high-risk users
Policy Priority and Overriding Behavior
Preset policies have priority rules.
Important:
- Preset policies override many custom configurations.
- Strict has higher priority than Standard.
- Custom policies with higher priority may override preset policies.
To verify priority:
- Review policy order.
- Check if custom anti-phishing or Safe Links policies are overriding presets.
Avoid creating weaker custom policies that reduce preset protections.
Common Areas Where Companies Fail
1. Not Enabling Preset Policies at All
Many tenants rely on default EOP settings without enabling Defender presets.
2. Applying Strict to Everyone
Strict may cause excessive false positives if applied to entire organization.
3. Overriding Presets with Custom Rules
Admins sometimes create custom policies that:
- Lower phishing sensitivity
- Allow user click-through
- Disable impersonation checks
This weakens protection.
4. Not Reviewing After Activation
Preset policies still require:
- Quarantine monitoring
- Impersonation list tuning
- Safe Links review
5. Ignoring High-Risk Users
Executives and finance staff should always receive stricter controls.
Best Practices
- Start with Standard for all users.
- Apply Strict to high-risk groups.
- Avoid weakening presets unless justified.
- Monitor quarantine regularly.
- Combine with DKIM, SPF, and DMARC enforcement.
- Review impersonation protection settings.
Preset policies simplify deployment but do not eliminate the need for monitoring.
Frequently Asked Questions
Are Preset Security Policies enabled by default?
No. Administrators must explicitly enable and assign them.
Can I customize Standard or Strict policies?
No. Presets cannot be edited. You can only assign them.
Do Preset Policies replace custom policies?
They may override certain custom policies depending on priority. Always review policy order.
Should I disable custom policies after enabling presets?
Not necessarily. Review them to ensure they do not weaken preset protections.
Does Strict significantly increase false positives?
It may increase sensitivity and result in more quarantined messages, especially in high-volume environments.
Are Preset Policies enough for complete protection?
They provide strong baseline protection but should be combined with proper authentication (SPF, DKIM, DMARC) and monitoring practices.