Baseline Security Mode for SMBs – Why it Matters  

A digital dashboard displays Baseline Security Mode ENABLED with a blue toggle switch. Below, it shows Authentication 5/5, Files 6/6, Room Devices 2/2. The top left corner reads Research Insights.

SMBs are not secondary targets. According to the Guardz Cybersecurity Report, nearly 50% of U.S. small businesses have been hit by a cyberattack. The 2025 Verizon Data Breach Investigations report reinforces this reality: SMBs are targeted nearly 4 times as often as large organizations, and BEC, identity attack, and ransomware are present in 88% of SMB breaches. 

Yet most SMBs operate without a dedicated security team, a CISO, or a formalized security program. The gap between the threat they face and the resources they have is not closing – it is widening.

Baseline Security Mode (BSM) is a direct response to that gap. It is not a watered-down enterprise framework or a checkbox compliance tool. It is a structured, opinionated security foundation built specifically for organizations that need protection without complexity.

This article is part of the ‘How-to guide for MSPs’ series. 


The Core Problem BSM Solves for SMBs

Every Microsoft 365 tenant ships with the same defaults, and most of those defaults prioritize compatibility over security. That made sense in 2015 when Microsoft needed every legacy Outlook plugin, every ActiveX control, and every IMAP client to keep working. It doesn’t make sense in 2025.

Still have questions before choosing a plan?
Talk to a real human. No forms. No waiting. No Slack account needed.

No Slack account needed.

What Changes for SMBs Specifically

Eliminates the #1 Attack Vector – Legacy Auth

The vast majority of SMB compromises we see in ITDR data start with credential stuffing or password spray against legacy protocols (IMAP, POP3, SMTP AUTH, EWS). These protocols:

  – Don’t enforce MFA password alone grants full mailbox access

  – Are enabled by default on most SMB tenants

  – They are rarely used because most SMB users are legitimately on Outlook/OWA (modern auth)

Prevents OAuth Consent Phishing

SMB users routinely click “Accept” on OAuth consent prompts without understanding what permissions they’re granting. Attackers exploit this by creating fake apps that request ‘Mail.Read’, ‘Files.ReadWrite.All’, etc.

Closes Document Attack Paths

SMBs don’t have endpoint security policies blocking ActiveX, DDE, or legacy file formats. BSM’s file protection settings block:

  – ActiveX in Office documents (malware dropper)

  – DDE in Excel (command execution without macros)

  – Legacy formats that exploit memory corruption

  – Microsoft Publisher (large attack surface, retiring 2026)

These are the exact vectors used in commodity phishing campaigns targeting SMBs.


Baseline Security Mode

As a Microsoft 365 admin, you can use Baseline Security Mode (BSM) settings to protect and secure your business environment against external threats.

Baseline Security Mode covers key Microsoft 365 services, including:

  • Microsoft 365 apps.
  • SharePoint and OneDrive.
  • Microsoft Teams.
  • Exchange Online.
  • Entra ID.

Baseline Security Mode puts 18 critical hardening settings behind a single admin center toggle, no PowerShell, no premium licensing, no security expertise required.

Screenshot of the Microsoft 365 admin center showing the Baseline security mode page. The progress bar indicates 13% completion, with 2 out of 16 recommendations applied. A recommended setting automation is noted.

The Setting Recommendations

Authentication

  • Block new password credentials in apps
  • Turn on restricted management user consent settings
  • Block access to ‎Exchange Web Services‎
  • Block basic authentication prompts
  • Block files from opening with insecure protocols
  • Block files from opening with the FPRPC protocol
  • Block legacy browser authentication connections to ‎SharePoint‎
  • Block IDCRL protocol connections to ‎SharePoint‎
  • Don’t allow new custom scripts in ‎OneDrive‎ and ‎SharePoint‎ sites
  • Remove access to ‎the Microsoft Store‎ for ‎SharePoint‎

Files

  • Open ancient legacy formats in Protected View and disallow editing
  • Open old legacy formats in Protected View and save as a modern format
  • Block ActiveX controls in the ‎Microsoft 365 apps‎
  • Block OLE Graph and OrgChart objects
  • Block Dynamic Data Exchange (DDE) server launch in ‎Excel‎
  • Block ‎Microsoft‎ ‎Publisher‎

Room Device

  • Block unmanaged devices and resource account sign-ins to ‎Microsoft 365 apps‎
  • Don’t allow resource accounts on ‎Teams Rooms‎ devices from accessing ‎Microsoft 365‎ files

BSM Deployment Cycle for SMBs

A 4-Week Rollout Guide for Microsoft 365 Baseline Security Mode

Microsoft launched Baseline Security Mode (BSM) at Ignite 2025 with 18 hardening settings across Authentication, Files, and Room Devices that every Microsoft 365 tenant should enable. 

You can find the dashboard at admin.cloud.microsoft > Baseline Security Mode.

Here’s a practical 4-week rollout that goes from zero-risk quick wins to settings that need a bit of planning.

———–———–———–

Week 1 – Zero-Impact File Hardening (6 Settings)

These block legacy file features that modern SMBs never use. Enable all on day one, no user disruption expected.

SettingWhat It DoesWhy It’s Safe
Block ActiveX controls in Microsoft 365 appsPrevents ActiveX from running in Word, Excel, and PowerPointActiveX is a legacy attack vector; modern documents don’t use it
Block OLE Graph and OrgChart objectsDisables legacy OLE-based chart and org chart objectsReplaced by SmartArt and modern charts years ago
Block Dynamic Data Exchange (DDE) server launch in ExcelStops Excel from launching external applications via DDEDDE is a classic malware delivery mechanism with no legitimate use in SMBs
Block Microsoft PublisherBlocks Publisher application from opening filesRarely used in SMBs; Publisher files are a common phishing payload format
Open ancient legacy formats in Protected View and disallow editingForces ancient formats (Office 97 and earlier) into read-only Protected ViewIf someone sends you a .doc from 1997, you want to inspect it first
Open old legacy formats in Protected View and save as modern formatOpens older formats in Protected View and prompts save-as-modernNudges users toward secure, modern file formats automatically

Tip: User communication needed: None. These are silent protections that won’t change anyone’s daily workflow.

———–———–———–

Week 2 – Legacy Protocol Lockdown (5 Settings)

Block deprecated authentication and file-access protocols. The only risk: a handful of users on very old clients or third-party apps using legacy auth.

SettingWhat It DoesPre-Check
Block basic authentication promptsStops Office apps from showing basic auth (username/password) promptsVerify no users rely on basic auth prompts in Office apps
Block files from opening with insecure protocolsPrevents Office files from being opened via insecure protocol handlersCheck for apps opening Office files via insecure protocol handlers
Block files from opening with FPRPC protocolBlocks legacy FrontPage RPC protocol for file accessFPRPC is legacy FrontPage RPC  extremely unlikely to be in use
Block legacy browser authentication connections to SharePointDisables legacy browser auth (RPS) to SharePoint OnlineCheck if anyone uses Internet Explorer or old Edge to access SharePoint
Block IDCRL protocol connections to SharePointBlocks legacy client authentication protocol to SharePointLegacy client auth with Office 2013 and older clients are affected

Pre-Deployment Checklist

1.    Run sign-in logs for 7 days, looking for legacy authentication client entries

2.    If count is zero → enable all five immediately

3.    If count is non-zero → identify those users and notify them to update their clients before enabling

Tip: User communication: Brief email, “We’re upgrading SharePoint security this week. If you’re using Office 2013 or older, please update to a current version.”

———–———–———–

Week 3 – App and Admin Controls (5 Settings)

These change admin-level behaviors. Slightly higher coordination is needed with IT or the MSP managing the tenant.

SettingWhat It DoesImpact
Block new password credentials in app registrationsStops new client secrets from being created on app registrationsExisting secrets still work until expiry. Plan migration to certificates.
Turn on restricted management user consent settingsUsers can no longer grant apps broad permissions, with admin approval requiredExpect a few “I need access to this app” tickets in the first week
Block access to Exchange Web Services (EWS)Disables the legacy EWS API endpointBreaks legacy EWS integrations (old backup tools, custom scripts). Audit connected apps first.
Don’t allow new custom scripts in OneDrive and SharePoint sitesBlocks Script Editor web part and custom JavaScriptCheck if any SharePoint sites rely on custom scripts before enabling
Remove access to Microsoft Store for SharePointDisables third-party app installs from the SharePoint StoreLow impact for most SMBs, few use the SharePoint app marketplace

Pre-Deployment Checklist

For blocking app secrets:

  • List apps with password credentials and plan migration for each
  • Existing secrets continue to work, and this only blocks new secret creation

For restricted user consent:

  • Review any pending consent requests in the Entra admin center
  • Set up an admin consent workflow so users can request access to new apps

For blocking EWS:

  • Audit any backup tool, LOB app, or script that connects to Exchange via EWS
  • Each one needs migration to the Microsoft Graph API before you enable this setting

For blocking custom scripts:

  • Audit SharePoint sites that allow custom scripts
  • Migrate any Script Editor web parts to modern SPFx web parts

Tip: User communication: “Starting this week, new app access requests require IT approval. If an app asks for permissions, submit a request through [your IT process].”

———–———–———–

Week 4 – Room Devices (2 Settings)

Only applies to tenants with Teams Rooms devices and resource accounts. Skip this week entirely if you don’t have conference room hardware.

SettingWhat It DoesImpact
Block unmanaged devices and resource account sign-ins to Microsoft 365 appsRequires a Conditional Access policy targeting resource accounts unmanaged devices get blockedRoom devices must be enrolled in Intune and marked compliant
Don’t allow resource accounts on Teams Rooms devices from accessing Microsoft 365 filesPrevents room accounts from browsing SharePoint and OneDriveStops resource accounts from accessing files they shouldn’t need

Pre-Deployment Checklist

  1. Inventory all resource accounts and Teams Rooms devices
  2. Ensure room devices are enrolled in Intune and marked as compliant

Tip: User communication needed: None. This only affects room and resource accounts, not end users.

Rollout Summary

WeekCategorySettingsRisk LevelTime to Deploy
Week 1File Hardening6Zero risk silent protections15 minutes
Week 2Legacy Protocols5Low risk after log check1 hour
Week 3App & Admin Controls5Moderate needs an audit first2–4 hours
Week 4Room Devices2Conditional skip if no rooms1–2 hours + monitoring
  18 total 4 weeks

TIP: Settings that block things nobody uses go first (Week 1–2). Settings that change how people or apps interact with Microsoft 365 go last (Week 3–4), after auditing current usage.

By the end of Week 4, your tenant hits 18/18 on the BSM dashboard full compliance with Microsoft’s recommended baseline.


The MSPs Angle

ROI: What BSM Actually Saves an SMB

Security ROI is hard to quantify until something goes wrong. Here’s what BSM prevents in real dollars for a typical 50-person SMB.

Cost of a Single Incident (Industry Averages for SMBs)

Incident TypeAverage CostBSM Settings That Prevent It
Business Email Compromise (BEC)$125,000 per incidentBlock EWS, block legacy auth, restrict user consent
Ransomware via macro/DDE payload$165,000 per incidentBlock DDE, block ActiveX, Protected View for legacy formats
Credential theft via legacy protocol abuse$50,000 per incidentBlock basic auth prompts, block IDCRL, block legacy browser auth
Malicious OAuth app consent phishing$75,000 per incidentRestrict user consent, block app password credentials
Data exfiltration via custom SharePoint script$95,000 per incidentBlock custom scripts, remove SharePoint Store access

Direct Time Savings for MSPs

ActivityBefore BSMAfter BSMAnnual Savings (per tenant)
Investigating legacy auth alerts2–3 hours/monthNear zero30 hours/year
Remediating OAuth consent abuse4–8 hours/incident, ~2/yearPrevented at source12 hours/year
Responding to macro/DDE malware6–10 hours/incident, ~3/yearBlocked by policy24 hours/year
Auditing app registrations for leaked secrets2 hours/quarterNo new secrets created8 hours/year
Cleaning up rogue SharePoint scripts1–2 hours/quarterBlocked by policy6 hours/year
Total MSP time saved  ~80 hours/year per tenant

At an average MSP billing rate of $150/hour, that’s $12,000/year in recovered capacity per tenant, time your team can spend on higher-value work instead of chasing preventable incidents.

The Break Even Math

ItemValue
Time to deploy BSM (4 weeks, part-time)~8 hours total
Cost at $150/hour$1,200 one-time
Annual time savings80 hours ($12,000)
ROI in year one10x return
Risk reduction (single BEC prevented)$125,000 avoided loss

The Bottom Line

BSM is arguably the single most impactful security improvement Microsoft has shipped for SMBs. It takes hardening steps that previously required security expertise and premium licensing, and delivers them as point-and-click toggles available on all M365 plans. An MSP admin can meaningfully reduce their attack surface in under an hour with zero additional cost.
The BSMAssessment tool (PowerShell-Based) will be available soon. Meanwhile, you can visit, star, and track the Security Research Labs.

Categories:

Subscribe to
Our Newsletter.

Continue Reading

A digital dashboard shows a list of users, with one dormant hybrid account highlighted in red and marked with an error icon. A callout reads “MFA not registered.” The background is dark with geometric patterns.

Uncovering a Dormant Hybrid

A digital diagram showing a central IP address connecting to various icons labeled Key Vault, Storage Account, Graph, and API—demonstrating Azure Managed Identity usage—with warning symbols near the API. Research Insights is highlighted at the top left.

Exploiting Azure Managed Identity Tokens from IMDS

Logos of Guardz and C-Data are shown side by side with a plus sign between them, on a dark background with green circuit-like lines, highlighting a partnership in cybersecurity solutions for MSPs.

Guardz and C-Data Partner to Bring Scalable Cybersecurity to MSPs Serving the SMB Market

A person in a futuristic chair sits at a high-tech control panel, looking out at a starry space scene with planets and mountains. The dashboard glows with colorful buttons and screens, like the perfect single post template for exploring new worlds.

Guardz, Your Cybersecurity
Co-Pilot for MSPs

Demonstrate the value you bring to the table as an MSP and gain visibility into your clients’ external postures.

Holistic Protection.
Hassle-Free.
Cost-Effective.
Slack
Slack
Chat with us No Slack account needed.