Security

SharePoint Security Hardening: 20-Point Enterprise Checklist for 2026

Your SharePoint environment is only as secure as its weakest configuration. This 20-point hardening checklist covers every attack surface from authentication to data exfiltration prevention.

Errin O'ConnorMarch 27, 202615 min read
SharePoint Security Hardening: 20-Point Enterprise Checklist for 2026 - Security guide by SharePoint Support
SharePoint Security Hardening: 20-Point Enterprise Checklist for 2026 - Expert Security guidance from SharePoint Support

The 20-Point SharePoint Security Hardening Checklist

After 25 years in the Microsoft ecosystem and hundreds of security assessments, I can tell you that most SharePoint breaches are not sophisticated attacks. They are configuration failures — default settings that should have been changed, sharing controls that were never restricted, and audit logging that was never enabled.

SharePoint security architecture with multiple protection layers
Multi-layer SharePoint security architecture

This checklist covers every attack surface in a SharePoint Online environment. If you implement all 20 points, you will be ahead of 95% of enterprises I have audited.

---

Authentication & Identity (Points 1-5)

1. Enforce MFA for All SharePoint Access

No exceptions. Not even for the CEO. Conditional Access policy in Microsoft Entra ID: require MFA for all users accessing SharePoint Online, from any device, from any location. Phishing-resistant MFA (FIDO2 keys or Microsoft Authenticator number matching) preferred over SMS.

2. Block Legacy Authentication Protocols

Legacy auth (Basic Auth, IMAP, POP3, ActiveSync without modern auth) bypasses MFA. Conditional Access policy: block legacy authentication for all users. This prevents credential-stuffing attacks against SharePoint-connected services.

3. Configure Conditional Access for Device Compliance

Require managed devices (enrolled in Intune) for full SharePoint access. Unmanaged devices get browser-only access with no download capability. This prevents data exfiltration to personal devices.

4. Implement Session Controls

SharePoint Admin Center > Access Control > Idle session sign-out: enable with 30-minute timeout. For sensitive sites, use Conditional Access App Control through Defender for Cloud Apps to enforce real-time session monitoring.

5. Deploy Privileged Access Management for SharePoint Admins

SharePoint Global Admins and Site Collection Admins have access to everything. Use Privileged Identity Management (PIM) in Microsoft Entra ID to require just-in-time activation of admin roles. Admin access should be time-limited (1-4 hours) and require approval.

---

Sharing & External Access (Points 6-10)

6. Set Organization-Wide Sharing to "Least Permissive"

SharePoint Admin Center > Sharing: set the organization-wide default to "Only people in your organization." Individual sites can be opened to external sharing when business justification exists, but the default must be restrictive.

7. Disable "Anyone" Links Organization-Wide

"Anyone" links allow access without authentication. Disable them completely. If anonymous sharing is needed for specific scenarios (public file downloads), use a dedicated site with restricted content.

8. Set Default Link Type to "Specific People"

When users share documents, the default should create a link that only specific named recipients can access — not "People in your organization" which grants access to all employees.

9. Require Guest Access Expiration

SharePoint Admin Center > Sharing > Guest access: set expiration to 30 days (or 90 days for long-term partnerships). After expiration, guests must be re-invited. This prevents stale guest access accumulating indefinitely.

10. Block Sharing with Specific Domains

If your organization should never share content with certain domains (competitors, sanctioned entities), add them to the sharing block list. SharePoint Admin Center > Sharing > domain filtering.

---

Data Protection (Points 11-15)

11. Deploy DLP Policies for Sensitive Content

Microsoft Purview DLP policies should scan all SharePoint content for: SSN, credit card numbers, health records (PHI patterns), financial data, source code, and any organization-specific sensitive patterns. Block sharing of detected sensitive content with external users. Alert compliance team on matches.

12. Apply Sensitivity Labels to All Sites and Documents

Every SharePoint site should have a default sensitivity label. Every document library containing sensitive content should require a label before documents can be saved. Sensitivity labels should control: encryption, access restrictions, visual markings, and sharing limitations.

13. Enable Microsoft Purview Audit Logging

Verify audit logging is ON (it is off by default on some tenants). Configure 1-year retention (E5) or purchase audit log retention add-on. Enable enhanced audit events for SharePoint: MailItemsAccessed, SearchQueryInitiatedSharePoint, FileAccessedExtended.

14. Deploy Microsoft Defender for Cloud Apps

Connect SharePoint Online to Defender for Cloud Apps for real-time monitoring. Configure policies for: mass download detection (potential data exfiltration), access from anonymous proxies/VPNs, impossible travel (access from two countries within 1 hour), and ransomware activity detection (rapid file encryption patterns).

15. Encrypt Sensitive Content with Sensitivity Labels

Sensitivity labels with encryption ensure that even if a document is downloaded or shared outside the organization, only authorized users can open it. The encryption follows the document regardless of where it goes.

---

Copilot Security (Points 16-17)

16. Audit Permissions Before Copilot Deployment

Copilot searches everything a user can access. Before deployment, run a full permission audit across all SharePoint sites. Remediate: "Everyone" grants, overshared sites, stale guest access, and sites with no sensitivity labels. Copilot amplifies every permission mistake.

17. Configure Copilot-Specific DLP Policies

Create DLP policies that specifically address Copilot scenarios: prevent Copilot from surfacing content labeled "Highly Confidential" in AI-generated responses, restrict Copilot access to sites below a certain sensitivity threshold, and monitor Copilot query logs for access to sensitive content.

---

Monitoring & Incident Response (Points 18-20)

18. Configure Real-Time Alerts for High-Risk Events

Set up alerts in Microsoft Purview and Defender for Cloud Apps for: external sharing of documents labeled Confidential or above, admin role activations, DLP policy overrides by users, bulk file operations (download/delete/move over 100 files in 1 hour), and new device/location access patterns.

19. Establish SharePoint Incident Response Procedures

Pre-define response procedures for common SharePoint security incidents: unauthorized data sharing (containment: revoke sharing, apply hold, investigate scope), compromised admin account (containment: disable account, revoke sessions, audit all admin actions in last 72 hours), ransomware detection (containment: isolate affected site, restore from versioning or backup), and data exfiltration (containment: block user, preserve audit logs, assess data scope for breach notification).

20. Conduct Annual SharePoint Security Assessment

Hire an independent assessor (not your day-to-day SharePoint consultant) to evaluate your SharePoint security posture annually. The assessment should cover all 20 points on this checklist plus: penetration testing of custom SPFx solutions, review of Power Automate flows for data leakage paths, and evaluation of third-party app permissions.

---

Security Hardening Priority Matrix

| Priority | Points | Timeline | Impact |

|----------|--------|----------|--------|

| Critical (do today) | 1, 2, 6, 7, 13 | This week | Blocks the most common attack vectors |

| High (do this month) | 3, 8, 9, 11, 12 | Within 30 days | Protects data and controls sharing |

| Important (this quarter) | 4, 5, 10, 14, 15 | Within 90 days | Advanced protection and monitoring |

| Copilot-specific | 16, 17 | Before Copilot deployment | Prevents AI-amplified data exposure |

| Ongoing | 18, 19, 20 | Continuous | Detection, response, and assessment |

---

Frequently Asked Questions

Is SharePoint Online secure by default?

No. SharePoint Online provides strong infrastructure security (Microsoft manages physical security, network security, and platform patches), but application-level security is your responsibility. Sharing defaults are permissive, audit logging may not be enabled, DLP is not configured, and sensitivity labels must be created and applied by your organization.

What is the biggest SharePoint security risk in 2026?

Overshared permissions amplified by Microsoft Copilot. Before Copilot, a user with accidental access to a sensitive document would only see it if they navigated to the specific library. With Copilot, that same user can ask a natural language question and Copilot will surface the sensitive content proactively.

How do I know if my SharePoint environment has been compromised?

Check Microsoft Purview audit logs for: unusual file access patterns, bulk downloads, sharing events to unknown external domains, admin role changes you did not authorize, and new OAuth app registrations. If you do not have audit logging enabled, you cannot detect compromise — enable it immediately (Point 13).

Should I use a third-party security tool for SharePoint?

Microsoft's native tools (Purview, Defender for Cloud Apps, Entra ID) cover 90% of security needs. Third-party tools add value for: advanced permission reporting and cleanup (ShareGate, Netwrix), user behavior analytics (Varonis, Exabeam), and backup/recovery beyond Microsoft's native capabilities.

How often should I audit SharePoint security?

Quarterly permission reviews, monthly sharing reports, real-time monitoring for high-risk events, and annual comprehensive security assessments. The cadence should increase if your organization is in a regulated industry or has experienced a security incident.

What compliance frameworks require SharePoint security hardening?

All major frameworks: SOC 2 (access controls, monitoring, incident response), HIPAA (PHI protection, audit trails, BAA), FedRAMP (NIST 800-53 controls), ISO 27001 (information security management), PCI DSS (cardholder data protection), and GDPR (data protection and privacy). The specific controls required vary by framework, but this 20-point checklist covers the overlap.

Share this article:

Written by Errin O'Connor

Founder, CEO & Chief AI Architect | Microsoft Press Bestselling Author | 25+ Years Microsoft Ecosystem

Errin O'Connor is a Microsoft Press bestselling author of 4 books covering SharePoint, Power BI, Azure, and large-scale migrations. He leads our SharePoint consulting practice with expertise spanning 500+ enterprise migrations and compliance implementations across HIPAA, SOC 2, and FedRAMP environments.

Need Expert Help?

Our SharePoint consultants are ready to help you implement these strategies in your organization.