Sign In

or
Don't have an account? 

How to Protect Your Microsoft 365 Data

Microsoft 365
Backup and Recovery
Cyber Security
Business Continuity
Data Protection
Microsoft 365 is highly reliable, but it is not a complete backup solution. Schools remain responsible for protecting and recovering their data. This guide explains the risks, what good looks like, and the practical steps schools should take to ensure their data is secure and recoverable.
Share:
X

Many schools have moved email, files and collaboration into Microsoft 365. It is a significant step forward in terms of availability and flexibility. However, it also changes how data protection works.

Microsoft is responsible for keeping the service running. Schools are responsible for ensuring their data can be recovered if something goes wrong.

This distinction is important. Without the right approach, schools can find themselves unable to recover critical data following deletion, account compromise or misconfiguration.

What are the risks?

The most common risks in Microsoft 365 environments are:

  • Accidental deletion of files or emails that are not noticed within the recovery window
  • Malicious deletion or alteration following account compromise
  • Ransomware-style attacks affecting synchronised files
  • Misconfigured permissions leading to data exposure or loss
  • Lack of a clear recovery point following significant changes

While Microsoft provides recycle bins, version history and retention policies, these are designed for short-term recovery and do not provide a full, independent backup.

What does good look like?

A well-managed Microsoft 365 environment should include:

  • An independent backup of Microsoft 365 data, separate from the live environment
  • Coverage of Exchange, OneDrive, SharePoint and Teams data
  • Defined retention periods aligned with school policies
  • Controlled and auditable access to backup and restore functions
  • Regular testing of recovery processes

This ensures that data can be restored even in scenarios where native Microsoft tools are insufficient.

Recommended approach for most schools

For most schools and trusts, the most proportionate solution is a cloud-to-cloud backup service.

This involves using a third-party platform to take regular copies of Microsoft 365 data and store them independently. These services allow granular recovery of emails, files and entire accounts.

Key expectations should include:

  • Automated daily backups
  • Flexible retention (for example, 1 to 7 years depending on need)
  • Ability to restore individual items and full datasets
  • Clear reporting and audit logs

Some larger trusts may choose to maintain additional backup layers or use their own storage, but this introduces additional complexity and management overhead.

Questions to ask your IT provider

  • Do we have a separate backup of Microsoft 365, or are we relying on Microsoft retention?
  • What data is backed up, and how often?
  • How quickly can we restore data if needed?
  • Have restore processes been tested recently?
  • Who can access backups, and how is that controlled?
  • How long is data retained, and can this be adjusted?

If these questions cannot be answered clearly, this should be treated as a risk.

Alignment with DfE and safeguarding expectations

Protecting data is not just a technical consideration. It supports:

  • DfE Digital and Technology Standards, particularly around resilience and data protection
  • Cyber Essentials requirements for backup and recovery
  • Keeping Children Safe in Education (KCSiE), where safeguarding records and communication may need to be retained and recovered

A lack of recoverable data can have significant consequences beyond IT, including safeguarding, compliance and governance risks.

Key takeaway

Microsoft 365 provides a reliable service, but it does not replace the need for backup.

Schools should ensure they have an independent, tested backup solution in place so that data can be recovered quickly and confidently when needed.

Share:
X

Other How To Guides
How to write a cyber security action plan that schools can actually deliver
Cyber Security
Action Planning
Risk Management
Digital Governance
Safeguarding
How to Check Whether Your Network Meets the DfE Digital Standards
Infrastructure
Networks
DfE Digital Standards
Cybersecurity
Compliance
IT Management
Strategic Planning
Digital Maturity
Cybersecurity Training Pathway
How to Get a Grip on Your IT Assets
Asset Management
Asset Register
How to Implement a Contracts Register in Your School or Trust
contract management
digital governance
DfE standards
school leadership
how to
templates
risk management
school business management
EdFITS
planning
How Governors Can Challenge and Support the School on Digital Matters
Governors
How To
EdFITS How-To Guide 08: Capacity Management
EdFITS
Capacity Management
How to Introduce Acceptable Use Agreements (AUPs) in Your School
Policy
Governance
EdFITS How-To Guide 05: Configuration Management
EdFITS
Configuration Management
How to
EdFITS How-To Guide 01: Service Desk
EdFITS
Service Desk
How to
EdFITS How-To Guide 03: Problem Management
EdFITS
Problem Management
How to
EdFITS How-To Guide 09: Service Level Management
EdFITS
Service Level Management
EdFITS How-To Guide 06: Release Management
EdFITS
Release Management
EdFITS How-To Guide 02: Incident Management
EdFITS
Incident Management
EdFITS How-To Guide 11: Financial Management
EdFITS
Financial Management
EdFITS How-To Guide 07: Availability Management
EdFITS
Availability Management
EdFITS How-To Guide 10: Service Continuity Management
EdFITS
Service Continuity Management
EdFITS How-To Guide 04: Change Management
EdFITS
Change Management
How to Use Your Technology Risk Register
Risk Register
How to Successfully Move to a New MIS: A Practical Step-by-Step Guide
MIS
Change Management
How to Protect Your Microsoft 365 Data on Digital Confidence for Education