In This Article
The Cost of Ungoverned M365
An enterprise deploys M365 to 5,000 users with default settings. Two years later: 3,200 Teams exist (600 abandoned, 200 duplicates, 150 with misleading names). 8,000 SharePoint sites with inconsistent permissions — 15% have company-wide read access that was never intended. 400 Power Automate flows running under various service accounts — 30 have access to production systems that the flow creator no longer manages. External sharing is enabled organization-wide — documents shared with vendors 2 years ago are still accessible. The security team discovers: 3 SharePoint sites exposing PII to all employees, 12 Teams channels where external guests have been silently added, and a Power Automate flow that emails a weekly report containing customer SSNs to a distribution list that includes a departed employee's forwarded email.
Every one of these is preventable with governance implemented at deployment — not retrofitted 2 years later. Retrofitting governance on 3,200 Teams and 8,000 SharePoint sites costs 10x more than implementing governance from day one.
Best Practice 1: Identity Governance
Conditional Access policies: Enforce MFA for all users (not just admins). Block sign-in from high-risk countries. Require compliant devices for access to sensitive applications. Session lifetime limits (re-authentication every 12 hours for sensitive apps, 30 days for low-risk). These policies should be deployed in the first week of any M365 implementation.
Guest access governance: External guests in Teams and SharePoint are necessary for collaboration with vendors and partners — but must be governed. Policies: guest invitations require approval (not self-service), guest access reviewed quarterly (who still needs access?), guest access expires after 90 days (automatic removal unless renewed), and guests can't create Teams or channels (consume only). Without guest governance, former vendors retain access indefinitely.
Privileged identity management: Global Admin, Exchange Admin, SharePoint Admin — these roles should never be standing assignments. Entra PIM converts them to just-in-time: the admin requests elevation, provides justification, receives approval, and the elevation expires after 4-8 hours. Standing admin count should be: 0 Global Admins standing (all through PIM), 2-3 break-glass accounts (emergency access with monitoring).
Best Practice 2: Teams Governance
Creation policy: Who can create Teams? Options: everyone (produces sprawl), IT only (creates bottleneck), or department leads with naming convention enforcement (balanced). The recommended approach: anyone can create Teams, but the creation process enforces: naming convention (auto-prefix with department code), classification (sensitivity label required), owner requirement (minimum 2 owners — prevents orphaned Teams when one person leaves), and description (mandatory — what is this Team for?).
Lifecycle management: Teams without activity for 90 days receive: automated notification to owners ("this Team has been inactive — archive or confirm it's still needed"). No response in 30 days → Team archived (content preserved, access removed from navigation). Archived Teams can be restored within 12 months. After 12 months → deleted (with 30-day soft delete recovery). This lifecycle prevents the abandoned-Teams problem that makes the Teams directory unusable.
Channel strategy: Standard channels for persistent conversations (General, Announcements, Projects). Private channels for sensitive discussions within the Team (HR cases, salary discussions, legal matters — accessible only to channel members, not all Team members). Shared channels for cross-Team collaboration (the Marketing and Sales teams share a "Campaign Coordination" channel without joining each other's Teams).
Best Practice 3: SharePoint Governance
Site architecture: Hub sites for organizational structure (Corporate, Departments, Projects). Communication sites for broadcasting (company news, policy updates, department announcements). Team sites for collaboration (each Team gets an associated SharePoint site). Critical: Break inheritance on sensitive sites — the default is to inherit permissions from the parent, which often means broader access than intended. Every SharePoint site containing sensitive data (HR, Finance, Legal) should have explicitly defined permissions that don't inherit.
Content types and metadata: Standardize document metadata organization-wide: Document Type (Policy, Procedure, Template, Report), Department, Owner, Effective Date, Review Date, and Classification (Public, Internal, Confidential, Restricted). Content types enforced at the site level ensure every document has the metadata needed for: search (find all policies expiring this quarter), governance (who owns this document?), Copilot accuracy (metadata helps Copilot retrieve the right document), and compliance (retention policies applied based on document type).
External sharing policy: Don't disable external sharing organization-wide (it's needed for vendor collaboration). Instead: site-level sharing policies (sensitive sites: no external sharing; collaboration sites: external sharing with approval), link expiration (shared links expire after 30 days — not indefinitely), and audit logging (every external share logged and reviewable). Purview DLP policies prevent sharing of documents containing PII or financial data externally regardless of site-level settings.
Best Practice 4: Data Protection and DLP
Sensitivity labels: 4-tier classification: Public (no restrictions), Internal (employees only, no external sharing), Confidential (department-restricted, encryption optional), Restricted (encryption required, no copying, watermarked). Labels applied: manually by users (for new documents) and automatically by Purview (scanning existing content for PII, financial data, health information). Labels enforce protection: a "Restricted" email can't be forwarded outside the organization. A "Confidential" SharePoint document can't be shared with guests.
DLP policies: Detect and prevent sharing of sensitive content: credit card numbers in email → block external send + notify compliance. SSNs in SharePoint documents shared externally → revoke access + alert. Health information in Teams messages → warn user + log for compliance review. DLP runs across: Exchange Online, SharePoint, OneDrive, Teams, and Power BI — providing consistent protection regardless of where the sensitive data surfaces.
Retention policies: Automatic retention and deletion based on content type and regulation: email retained 7 years (SOX requirement), HR documents retained 7 years after termination, financial records retained 7 years, marketing materials retained 3 years. Retention policies prevent: premature deletion (user deletes a document that's under legal hold) and perpetual retention (storing everything forever increases storage cost and compliance risk).
Best Practice 5: Power Platform Governance
Power Platform governance prevents the "shadow IT through low-code" problem — business users building apps and automations that access production data without IT oversight.
Environment strategy: Default environment (all users, basic connectors only — M365, SharePoint, OneDrive), production environments (department-specific, approved connectors, IT-reviewed apps), and developer environments (sandbox for testing, no production data access). DLP policies per environment: the default environment allows only standard M365 connectors. The production environment allows approved premium connectors. No environment allows both business and HTTP connectors (preventing data exfiltration through custom APIs).
Maker management: Track who builds what: Power Automate flows and Power Apps registered in a central inventory. High-risk automations (accessing production data, running on schedules, sending external emails) require IT review before production deployment. Orphaned flows (creator left the organization) identified and reassigned or decommissioned monthly.
Best Practice 6: Lifecycle Management
M365 resources have lifecycles — they're created, used, and eventually become obsolete. Without lifecycle management, obsolete resources accumulate forever. Lifecycle policies: Teams: archive after 90 days inactive, delete after 12 months archived. SharePoint sites: review after 12 months inactive, archive after 24 months. Guest accounts: access review quarterly, remove after 90 days without activity. Power Automate flows: review orphaned flows monthly, disable and archive after 60 days without owner. Shared links: expire after 30 days (configurable per site). Lifecycle management reduces: storage costs (archived content moves to cold storage), security risk (orphaned resources with stale permissions), and administrative overhead (fewer active resources to manage).
Monitoring and Compliance Reporting
M365 Admin Center reports: Active users by app (who uses what), storage consumption by site, Teams activity (messages, meetings, files shared), and email volume and threats blocked. Review weekly for operational health.
Purview Compliance Center reports: Sensitivity label usage (how much content is classified), DLP policy matches (how often sensitive data is detected), retention policy compliance (content retained per policy), and information barriers (cross-department communication restrictions). Review monthly for compliance posture.
Security Center reports: Secure Score (overall security posture 0-100 — target 80+), Conditional Access insights (blocked sign-ins, risky sign-ins), threat detection (phishing attempts, malware, suspicious activities), and identity protection (risky users, risky sign-ins, vulnerability detections). Review weekly for security health.
Custom compliance dashboard: Combine: Secure Score trend, DLP violation trend, Teams governance compliance (% of Teams meeting naming convention, % with active owners), SharePoint permission health (% of sites with appropriate access levels), and guest access status (active guests, overdue reviews). The dashboard provides a single view of M365 governance health — replacing the "check 5 different admin centers" approach with one consolidated report.
M365 Administration: Operational Best Practices
M365 administration at scale requires structured operations: admin role separation (Global Admin for emergencies only — day-to-day administration through: Exchange Admin, SharePoint Admin, Teams Admin, Security Admin, Compliance Admin — each scoped to their service), change management process (all tenant-wide configuration changes documented, tested in a non-production tenant if available, and communicated before deployment), service health monitoring (Microsoft 365 Service Health dashboard for outage awareness + custom monitoring for organization-specific metrics), and license management (monthly review: unused licenses reclaimed, departing employee licenses recycled, new employee licenses provisioned within SLA). The admin team for a 1,000-user M365 tenant: 1 senior admin (policy, architecture), 2 operational admins (daily operations, user support), and 1 security/compliance admin (Purview, Defender, Conditional Access). Larger organizations scale proportionally — approximately 1 admin per 500 users for operational management.
The Xylity Approach
We implement M365 governance with the 6 best practices — identity governance (Conditional Access, PIM, guest management), Teams governance (creation policies, lifecycle, channels), SharePoint governance (architecture, metadata, sharing), data protection (Purview labels, DLP, retention), Power Platform governance (environments, DLP, maker management), and lifecycle management. Our Power Platform consultants and Purview specialists implement governance from day one — preventing the 10x remediation cost of retrofitting governance after 2 years of ungoverned growth.
Go Deeper
Continue building your understanding with these related resources from our consulting practice.
Govern M365 Before It Governs You
Six best practices — identity, Teams, SharePoint, data protection, Power Platform, lifecycle. M365 governance implemented from day one.
Start Your M365 Governance Program →