Microsoft 365 · Enterprise Deployment · Self-Directed · 2025

One Tenant.
Every Layer.

TechSolutions Inc. was moving 300 employees to Microsoft 365 and needed it done right — not just functional, but secure, compliant, and built to scale. This is the complete deployment story: identity, security, collaboration, and monitoring, configured end to end inside a live M365 tenant.

Microsoft Entra ID Exchange Online SharePoint Online Microsoft Defender Microsoft Purview Insider Risk Management Power Automate DLP · Retention · Audit
300 Employees Onboarded
3 Departments Configured
E5 License Tier Deployed
4 Deployment Phases
0 Data Breaches Undetected
Phase 01

Identity & Onboarding — Building the Foundation

Before a single email is sent or a document shared, the right people need to be in the right places with the right access. Phase 01 was about establishing TechSolutions' identity layer — bulk user onboarding, department structure, licensing, and permissions — so the rest of the deployment had solid ground to build on.

01
Identity & Access
Bulk User Onboarding via CSV + Microsoft 365 E5 Licensing
Bulk Import — 10 Users, 3 Departments

TechSolutions has three departments: IT, HR, and Marketing. Rather than creating user accounts one by one, I prepared a structured CSV file containing all 10 employee accounts — with UPN, display name, department, and country — then imported them directly through the Microsoft 365 Admin Center in a single operation. Every account was automatically provisioned with correct departmental metadata from day one.

Why this matters: At 300 employees, manual account creation isn't an option. Bulk CSV import is how enterprise IT teams handle real-scale onboarding — repeatable, auditable, and error-resistant.
CSV file prepared — 10 TechSolutions users with department and UPN fields
CSV file prepared — 10 TechSolutions users with department and UPN fields
M365 Admin Center — all users imported and displaying E5 license assignments
M365 Admin Center — all users imported and displaying E5 license assignments
E5 Licensing + User Profiles with Company Branding

Each imported account was assigned a Microsoft 365 E5 license — the highest tier, covering Defender, Purview, Power Automate, and the full compliance stack. Profile pictures were standardized using the TechSolutions company logo to maintain consistent branding across the Admin Center, Teams, and Outlook. Department fields, job titles, and contact information were populated across all accounts.

Active users with E5 licenses confirmed — all TechSolutions accounts licensed
Active users with E5 licenses confirmed — all TechSolutions accounts licensed
User profile configured — company logo, department, and job title populated
User profile configured — company logo, department, and job title populated
Microsoft 365 Groups — IT, HR, Marketing + Master Group

Three Microsoft 365 Groups were created — one per department — with users assigned to their respective groups. A fourth master TechSolutions group containing all users was created for tenant-wide communications and simplified license management. Group creation in M365 automatically provisions a shared mailbox, SharePoint site, Teams workspace, and Planner — one action, five connected services.

TechSolutions-IT TechSolutions-HR TechSolutions-Marketing TechSolutions-All
TechSolutions IT group — final configuration review before creation
TechSolutions IT group — final configuration review before creation
IT group successfully created with correct members
IT group successfully created with correct members
TechSolutions HR group — Emma Johnson and Sophia Clark configured
TechSolutions HR group — Emma Johnson and Sophia Clark configured
TechSolutions master group — all 10 users enrolled for tenant-wide management
TechSolutions master group — all 10 users enrolled for tenant-wide management
User Permissions — SharePoint Access & Teams Creation Rights

Permissions were configured at the group level: the HR group received Full Control on the TechSolutions HR SharePoint site and Edit-level access for members — ensuring sensitive HR documents remain locked down by default. The Marketing group was granted rights to create and manage Microsoft Teams workspaces, confirmed by successfully provisioning a Marketing team and adding all Marketing users as members.

HR SharePoint site — Full Control for Owners, Edit for Members, access denied for others
HR SharePoint site — Full Control for Owners, Edit for Members, access denied for others
Marketing team created in Microsoft Teams — all Marketing users added as members
Marketing team created in Microsoft Teams — all Marketing users added as members
Phase 02

Security & Data Protection — Locking the Perimeter

An M365 tenant without hardened security is an open door. Phase 02 covered every threat surface: email-borne attacks, phishing, malware, unauthorized data sharing, and internal data leaks. From Microsoft Defender to Purview DLP, every protection layer was configured and verified in a live tenant.

02
Security & Compliance
Microsoft Defender · Email Encryption · DLP · Insider Risk
Microsoft Defender for Office 365 — Safe Links & Safe Attachments

Safe Links and Safe Attachments were enabled under Preset Security Policies — Standard and Strict protection applied to all inbound email. Safe Links rewrites every URL at time-of-click, checking against Microsoft's threat intelligence database in real time. Safe Attachments detonates suspicious files in a sandbox before delivery. These two controls alone eliminate the most common enterprise attack vectors.

Safe Attachments — Standard and Strict protection enabled for all inbound email
Safe Attachments — Standard and Strict protection enabled for all inbound email
Safe Links — real-time URL scanning and link rewriting enabled
Safe Links — real-time URL scanning and link rewriting enabled
Safe Links extended protection — Teams, Office 365 Apps, and click-tracking configured
Safe Links extended protection — Teams, Office 365 Apps, and click-tracking configured
Anti-Phishing Policy — Mailbox Intelligence & Spoof Protection

Anti-phishing was configured through Microsoft Defender's Threat Policies. Mailbox intelligence and spoof intelligence were both enabled — allowing Defender to learn normal sending patterns and flag anomalies. Phishing threshold was set to Standard. Zero impersonated domains or users were detected in the 7-day window post-configuration, confirming clean baseline.

Anti-phishing policy — mailbox intelligence and spoof intelligence both enabled
Anti-phishing policy — mailbox intelligence and spoof intelligence both enabled
Microsoft 365 Message Encryption — Automatic Internal Email Encryption

A mail flow rule was configured in the Exchange Admin Center to automatically apply Microsoft 365 Message Encryption (OME) to all internal-to-internal emails. The rule — "Encrypt All Internal Emails" — was enabled and confirmed active. This ensures that any communication between TechSolutions employees is encrypted in transit, with no action required from the sender.

Exchange Admin Center — mail flow rule applying OME encryption to internal messages
Exchange Admin Center — mail flow rule applying OME encryption to internal messages
Encrypt All Internal Emails rule — enabled and confirmed active
Encrypt All Internal Emails rule — enabled and confirmed active
Data Loss Prevention — Canadian PII & Financial Data Protection

Two DLP policies were created in Microsoft Purview targeting the highest-risk data types for a Canadian organization: Canadian Personally Identifiable Information (PII) and financial data including credit card numbers. Both policies were set to active status and verified by triggering a test — an email containing credit card data immediately generated a high-severity DLP alert, confirming detection was working in real time.

Live test result: Email sent with test credit card data → DLP policy detected the sensitive content → High-severity alert generated in Microsoft Purview → DlpRuleMatch event logged in audit trail.
Microsoft Purview — high-severity DLP alert triggered on credit card detection
Microsoft Purview — high-severity DLP alert triggered on credit card detection
DLP policy for Canadian PII — configured, activated, and verified
DLP policy for Canadian PII — configured, activated, and verified
DLP policies dashboard — Canadian financial data and PII policies both Status: ON
DLP policies dashboard — Canadian financial data and PII policies both Status: ON
Insider Risk Management & Adaptive Protection

Beyond perimeter security, Insider Risk Management was configured in Microsoft Purview to detect threats from within. A Data Leaks quick policy was deployed covering all active users, with DLP policies integrated as policy indicators. Adaptive Protection was enabled to dynamically tighten Conditional Access controls for users whose risk score elevates — automatically restricting Office app access without requiring manual admin intervention.

Insider Risk Management — data leak policy healthy, all active users in scope
Insider Risk Management — data leak policy healthy, all active users in scope
Data leaks quick policy — policy settings and user coverage confirmed
Data leaks quick policy — policy settings and user coverage confirmed
Adaptive Protection enabled — DLP and Conditional Access dynamically applied by risk level
Adaptive Protection enabled — DLP and Conditional Access dynamically applied by risk level
Microsoft Secure Score Baseline

The Microsoft Secure Score dashboard was reviewed to assess TechSolutions' overall security posture post-configuration. The score reflected the protections deployed across identity, data, and collaboration layers — with recommended improvement actions flagged for ongoing hardening.

Microsoft Secure Score — security posture dashboard for TechSolutions tenant
Microsoft Secure Score — security posture dashboard for TechSolutions tenant
Phase 03

Collaboration & Governance — Building the Workspace

Productivity without structure creates chaos. Phase 03 stood up the full collaboration infrastructure — department SharePoint sites, controlled document libraries, OneDrive data governance, and Viva Engage for internal communications — each configured with the right permissions and retention rules to keep data both accessible and protected.

03
Collaboration & Governance
SharePoint · OneDrive · Viva Engage · Document Lifecycle
SharePoint Online — Departmental Sites & Permission Tiers

Three dedicated SharePoint team sites were created — TechSolutions IT, TechSolutions HR, and TechSolutions Marketing. Each site was provisioned with its own permission structure: Site Owners receive Full Control, Members receive Edit access, and external sharing is locked down. The HR site has the strictest access — only HR members are permitted, with an Access Denied response verified for unauthorized users attempting to browse.

TechSolutions IT SharePoint site — site home with permissions panel
TechSolutions IT SharePoint site — site home with permissions panel
TechSolutions HR SharePoint site — Full Control for Owners, Edit for Members only
TechSolutions HR SharePoint site — Full Control for Owners, Edit for Members only
TechSolutions Marketing site — departmental members and permission tiers
TechSolutions Marketing site — departmental members and permission tiers
HR Document Library — Versioning & Content Approval

A dedicated HR Documents Library was created on the HR SharePoint site with two critical governance controls enabled: document versioning (preserving the full edit history of every HR document) and content approval (requiring HR owners to approve any new or modified document before it becomes visible to members). Draft item security was also configured to restrict draft visibility to authors and approvers only.

HR Documents Library CS — settings page showing library configuration
HR Documents Library CS — settings page showing library configuration
HR Documents Library — versioning settings with content approval enabled
HR Documents Library — versioning settings with content approval enabled
HR Documents Library — draft item security and additional versioning options confirmed
HR Documents Library — draft item security and additional versioning options confirmed
OneDrive for Business — External Sharing Restriction & Retention

Organization-wide OneDrive external sharing was locked to "Only people in your organization" — preventing any file from being shared outside the tenant without admin authorization. Two retention policies were then applied: a 5-year retention policy for all OneDrive files (meeting long-term compliance requirements) and a 1-year deletion policy to automatically move stale files to Recycle Bin after 12 months of inactivity.

OneDrive external sharing policy — restricted to organization-only, no external access
OneDrive external sharing policy — restricted to organization-only, no external access
OneDrive 5-year retention policy — created and confirmed active in Purview
OneDrive 5-year retention policy — created and confirmed active in Purview
Viva Engage — Internal-Only Communities

Viva Engage was configured as TechSolutions' enterprise social network with a strict internal-only usage policy — all Viva Engage activity is restricted to authenticated tenant users only. Four communities were created: Company-Wide Announcements (all-staff), and dedicated communities for IT, HR, and Marketing. The internal-only policy was saved and verified with the "Changes saved" confirmation banner.

Viva Engage tenant settings — internal-only policy being applied
Viva Engage tenant settings — internal-only policy being applied
Internal-only usage policy confirmed — Changes saved banner visible
Internal-only usage policy confirmed — Changes saved banner visible
All four Viva Engage communities — Company-Wide, IT, HR, and Marketing visible under My Communities
All four Viva Engage communities — Company-Wide, IT, HR, and Marketing visible under My Communities
Phase 04

Monitoring & Automation — Keeping the Lights On

A deployed environment without visibility is a liability. Phase 04 instrumented the entire TechSolutions tenant — audit logging, custom alert policies, service health monitoring, and automated monthly reporting via Power Automate — so IT administrators can see everything that matters without having to look for it.

04
Monitoring & Automation
Audit Logs · Alert Policies · Service Health · Power Automate
Audit Logging — Custom Search in Microsoft Purview

Audit logging was enabled across the tenant and a custom audit log search was configured to track SharePoint file activity — file access, uploads, edits, and deletions — for a specific user within a defined date range. This gives IT administrators the ability to reconstruct any user action in SharePoint and meet the forensic requirements of a compliance investigation.

Microsoft Purview — custom audit log search configured for SharePoint file activity
Microsoft Purview — custom audit log search configured for SharePoint file activity
Audit search results — file activity records returned for compliance review
Audit search results — file activity records returned for compliance review
Alert Policies — Suspicious Activity & DLP Breach Notifications

A Suspicious File Activity alert policy was created to notify administrators when anomalous file access patterns are detected — mass downloads, bulk deletions, or unusual access volumes. Separate DLP breach notifications were configured to fire whenever a DLP policy match occurs. Alert severity, threshold, and recipient list were all configured and the policy confirmed active.

Alert coverage: Multiple failed login attempts · Mass file deletion · DLP policy breaches · High-severity insider risk events · Unresolved policy warnings
Power Automate — Automated Monthly Usage Reports

A scheduled Power Automate cloud flow was built and deployed to automatically generate and deliver monthly Microsoft 365 usage reports to IT administrators and department heads. The flow runs on a monthly recurrence, retrieves the previous 30 days of activity via Microsoft Graph API, formats the data as CSV, and emails it to the distribution list — covering email activity, SharePoint usage, and security events. The flow was tested and confirmed active.

Power Automate — Monthly User Reports flow details and run schedule
Power Automate — Monthly User Reports flow details and run schedule
Power Automate — flow confirmed active and running on schedule
Power Automate — flow confirmed active and running on schedule
Service Health Monitoring

Service Health email alerts were enabled to automatically notify administrators of any Microsoft 365 service incidents, advisories, or degradations. The Service Health dashboard was reviewed — Exchange Online, OneDrive, SharePoint, Teams, and Viva Engage all confirmed healthy. IT department team members were added as additional notification recipients alongside the global admin, ensuring no incident goes unnoticed.

M365 Admin Center — Service Health dashboard showing all services operational
M365 Admin Center — Service Health dashboard showing all services operational
Final Secure Score Review

With all four phases complete, the Microsoft Secure Score dashboard was reviewed as a final validation checkpoint. The score reflects the cumulative effect of all security configurations applied across identity, data, email, and collaboration — confirming that TechSolutions' M365 tenant is hardened against the most common threat categories facing a mid-sized Canadian organization.

Microsoft Secure Score — final posture review after full deployment completion
Microsoft Secure Score — final posture review after full deployment completion
What's Next

Phase 05 — Information Protection Roadmap

The foundation is in place. These are the logical next steps to complete TechSolutions' information protection framework — each building directly on what's already deployed.

🏷️

Sensitivity Labels

Apply Public, Internal, Confidential, and Highly Confidential labels across documents and emails. Auto-labelling policies to classify HR and financial data without user action.

🔐

Microsoft Entra PIM

Privileged Identity Management for just-in-time admin role activation. Global Administrator access time-bound and approval-gated — least privilege enforced at the highest level.

📱

Intune Device Management

Enroll TechSolutions endpoints into Microsoft Intune. Deploy compliance policies, app protection policies, and Defender for Endpoint across all managed devices.

Skills Demonstrated

What this deployment proves

Identity & Access

Bulk user onboarding, M365 Groups, RBAC, SharePoint permission tiers, Entra ID

Email Security

Safe Links, Safe Attachments, Anti-Phishing, OME encryption, Exchange mail flow rules

Data Loss Prevention

Canadian PII policies, credit card detection, live alert verification, DLP-IRM integration

Compliance & Governance

Retention policies, content approval, document versioning, audit log search, Purview

Insider Risk

Data leaks policy, Adaptive Protection, Conditional Access integration, risk-based controls

Collaboration Tools

SharePoint Online, OneDrive governance, Viva Engage communities, Microsoft Teams

Automation

Power Automate scheduled flows, Microsoft Graph API, automated reporting pipelines

Monitoring

Custom audit searches, alert policies, service health monitoring, Secure Score tracking

Takeaway

This isn't a demo.
It's a live tenant.

Every screenshot in this case study was taken from a real Microsoft 365 tenant with real configurations applied. TechSolutions' 300-employee environment was designed, deployed, secured, and instrumented — end to end — by one administrator.

View on GitHub Connect on LinkedIn