Microsoft 365 Tenant — The Cloud Workplace Foundation

M365-TENANT

An M365 tenant is the top-level organisational boundary in Microsoft's cloud — a dedicated instance of Entra ID plus a subscription to Microsoft services. Understanding what a tenant is, how licenses map to services, and what the admin centres actually control is the prerequisite for everything from deploying Exchange Online to configuring Teams telephony.

emailmicrosoft-365tenantentra-idlicensesteamssharepointonedrive

Overview

Every organisation using Microsoft 365 operates within a single tenant. The tenant is not just an account — it is a dedicated instance of Microsoft’s identity platform (Entra ID), provisioned with whichever cloud services the organisation has subscribed to: Exchange Online for email, SharePoint Online for document storage, Teams for collaboration, Intune for device management, and so on. All of these services share the same identity store, the same user directory, and the same administrative boundary.

Understanding what a tenant is, and what it is not, matters because almost every M365 problem ultimately traces back to tenant-level configuration: a user’s license does not include the service they need, a Conditional Access policy is blocking authentication, a domain was never verified, or an administrator is working from the wrong admin centre for the task at hand.


What a Tenant Is

When an organisation signs up for Microsoft 365, Microsoft provisions a new Entra ID directory scoped exclusively to that organisation. This directory is the tenant. It has a globally unique identifier (the Tenant ID — a GUID) and an initial domain name in the form <organisationname>.onmicrosoft.com.

The .onmicrosoft.com name cannot be changed — it is the permanent identifier. All M365 services and APIs reference the tenant by Tenant ID or by this domain. It appears in SharePoint URLs (nakamas-it.sharepoint.com), in Teams meeting links, and in Exchange Online’s internal routing name (nakamas-it.mail.protection.outlook.com).

Verified custom domains are added on top of the .onmicrosoft.com default. Adding a domain requires proving DNS ownership — Microsoft generates a TXT record value and checks for it. Once verified, users can have UPNs and email addresses at the custom domain ([email protected] rather than [email protected]).

A tenant is a flat, global construct. There is no inherent concept of offices, regions, or departments at the tenant level — those structures are represented through Entra ID objects (OUs do not exist in Entra ID; administrative units, groups, and dynamic groups serve similar purposes). One tenant encompasses all users, groups, devices, and data for the entire organisation, regardless of geography.


Data Residency

By default, M365 data is stored in the region where the tenant was provisioned — data provisioned in Europe stays in European datacentres; US tenants are served from US datacentres. Microsoft publishes which workload stores data in which region for the tenant’s provisioned geography.

For organisations with strict data sovereignty requirements (GDPR, sector regulations), Microsoft offers:

Multi-Geo does not create a separate tenant — it is a single tenant whose data is distributed across geographies. Administration remains unified.


License Architecture

M365 licenses are assigned per-user and bundle access to a set of services. Microsoft sells several distinct license families targeting different organisation sizes and feature requirements.

Business Plans (up to 300 users)

PlanCore ServicesDesktop AppsSecurity/Management
M365 Business BasicExchange Online Plan 1, SharePoint, Teams, OneDrive 1 TBWeb-only (Office for the web)None beyond defaults
M365 Business StandardExchange Online Plan 1, SharePoint, Teams, OneDrive 1 TBOffice desktop apps (5 devices per user)None beyond defaults
M365 Business PremiumExchange Online Plan 1, SharePoint, Teams, OneDrive 1 TBOffice desktop appsIntune, Defender for Business, Entra ID P1, Azure Information Protection P1

Business Basic is the starting point for cloud-only email and collaboration. It covers every employee who needs email and Teams but does not need Office desktop applications. Business Premium is the recommended plan for SMBs needing device management and security — Intune’s presence enables MDM/MAM policies, and Defender for Business provides endpoint detection and response (EDR) capabilities.

Enterprise Plans (no user cap)

PlanKey Additions vs BusinessNotable Email/Compliance Features
M365 E3Enterprise compliance, eDiscovery, Exchange Online Plan 2, Purview Compliance P1Unlimited archiving, litigation hold, in-place eDiscovery, Azure RMS
M365 E5Defender for Office 365 P2, Defender for Identity, Defender for Endpoint P2, Purview Compliance P2, Power BI ProAdvanced threat analytics, CASB (Defender for Cloud Apps), insider risk management

The jump from E3 to E5 is primarily a security and compliance story. E5 adds Microsoft Sentinel integration, full Defender XDR capabilities, and advanced Purview features (communication compliance, customer lockbox, privileged access management). For most organisations, E3 covers operational requirements; E5 covers regulated industries and organisations with mature security programmes.

Add-On Licenses

Microsoft also sells capabilities as stand-alone add-ons that can be mixed with base plans:


Services in Microsoft 365

A licensed M365 user has access to a suite of cloud services, all sharing the same identity. Each service has its own admin centre, its own quota, and its own set of features gated by license tier.

Exchange Online

Email, calendar, and contacts. Covered in detail in the Exchange Online article. Comes in Plan 1 (50 GB mailbox) and Plan 2 (unlimited mailbox + archive). The primary resource that most administrators spend time managing.

SharePoint Online

The document management and intranet platform underlying all file storage in M365. Every M365 group, every Teams team, and every user’s OneDrive is backed by a SharePoint site collection. SharePoint provides:

SharePoint storage quota is pooled across the tenant (1 TB base + 10 GB per licensed user). Approaching the quota causes issues for OneDrive sync and file upload across the organisation — it is a shared resource.

OneDrive for Business

Per-user file storage — 1 TB per user by default, expandable to 5 TB on request and unlimited on E3/E5. OneDrive is technically each user’s personal SharePoint site collection. The sync client (OneDrive application) makes it look like a local drive; actual storage is in Microsoft’s datacentres.

Files shared from OneDrive are shared via SharePoint’s sharing model — the file stays in OneDrive but a sharing link or direct permission grants access. The distinction between “OneDrive” and “SharePoint” is largely a UX convention; under the hood, they use the same storage infrastructure.

Microsoft Teams

The unified communication and collaboration platform. Teams is built on top of Exchange Online (for meeting invites, calendar integration, and Group mailboxes) and SharePoint (every Team has a SharePoint site and document library for file storage in channels). The actual real-time messaging, calling, and meeting infrastructure is Teams-native.

Teams features relevant for administrators:

Entra ID (formerly Azure Active Directory)

The identity and access management platform for the entire M365 tenant. Entra ID is not Exchange’s LDAP — it is an OAuth 2.0 and OpenID Connect identity provider that every M365 service uses for authentication and authorisation.

Every user, group, service principal (app registration), and device in M365 is an object in Entra ID. The features available depend on the license:

Intune (Microsoft Endpoint Manager)

Mobile device management (MDM) and mobile application management (MAM) platform. Available from M365 Business Premium upward.


Admin Centres

Each M365 service has its own administration portal. Understanding which admin centre controls which setting avoids the frustration of looking in the wrong place.

Admin CentreURLManages
M365 Admin Centeradmin.microsoft.comUsers, licenses, billing, domains, service health, support
Exchange Admin Centeradmin.exchange.microsoft.comMailboxes, transport rules, connectors, mail flow, quarantine
Entra Admin Centerentra.microsoft.comUsers (identity), groups, Conditional Access, app registrations, identity governance
Teams Admin Centeradmin.teams.microsoft.comTeams policies, calling, meeting settings, phone numbers
SharePoint Admin Center<tenant>-admin.sharepoint.comSite collections, storage quota, external sharing settings
Intune (Endpoint Management)intune.microsoft.comDevice compliance, configuration profiles, app deployment, Autopilot
Microsoft Purviewcompliance.microsoft.comRetention policies, eDiscovery, data loss prevention, insider risk
Defender Portalsecurity.microsoft.comSafe Attachments, Safe Links, threat explorer, incidents, attack simulation

The M365 Admin Center is the entry point and contains shortcuts to the others. However, it is a thin layer — most detailed configuration happens in the service-specific admin centre. A common source of confusion: user account management at the identity level (UPN, group membership, MFA methods) happens in the Entra Admin Center; user mailbox management (shared mailbox permissions, email aliases, forwarding) happens in the Exchange Admin Center, even though both refer to the same user.


Conditional Access and MFA

Conditional Access is the policy engine in Entra ID that controls the conditions under which a user can authenticate to any M365 service. It evaluates signals — user identity, device compliance, network location, application being accessed, sign-in risk — and either grants access, grants access with requirements (MFA challenge, device enrolment), or blocks access.

Conditional Access policies require Entra ID P1 or higher. Without P1, the only option is Security Defaults — a Microsoft-managed policy that enables MFA for all users (via the Microsoft Authenticator app or SMS) and blocks legacy authentication protocols.

A well-structured Conditional Access framework for most SMBs covers:

  1. Require MFA for all users — baseline policy, no exceptions except break-glass accounts
  2. Block legacy authentication — disables protocols that do not support modern MFA (IMAP with Basic Auth, POP3 with Basic Auth, older SMTP AUTH)
  3. Require compliant device for Exchange and SharePoint — only Intune-enrolled and compliant devices can access corporate data
  4. Block access from high-risk sign-ins — requires Entra ID P2 (Identity Protection); automatically blocks or forces password reset on risky sign-ins

Conditional Access policies apply at the token issuance point — when a user signs in and receives an OAuth access token. If a policy requirement is not met, the token is not issued and the application receives an authentication error. The user experience is a browser prompt (for web apps) or an error message in the app explaining what is required.


Break-Glass Accounts

Microsoft consistently recommends maintaining at least two break-glass global administrator accounts. These accounts exist to restore access in scenarios where normal administrative accounts are locked out — for example, if a Conditional Access policy is misconfigured and blocks all sign-ins, including administrators.

Break-glass accounts are configured as follows:

Break-glass accounts should never be used for routine administration. Their sign-ins are monitored precisely because any use is unusual.


Service Health and SLAs

Microsoft commits to a 99.9% uptime SLA for paid M365 plans. This translates to a maximum of approximately 8.7 hours of allowable downtime per year. The SLA covers the core services — Exchange Online, SharePoint Online, Teams. Service credits are available if Microsoft fails the SLA, though the credit process requires a support ticket.

The Service Health Dashboard (in the M365 Admin Center under Health → Service Health) shows current and historical incidents. It distinguishes between:

Third-party monitoring (Downdetector, Microsoft 365 Status on X/Twitter @MSFT365Status) can provide faster notification than internal monitoring, particularly for large-scale outages where the admin centre itself may be affected.

For critical workloads, do not rely solely on Microsoft’s status page — monitor the services directly. A synthetic monitoring check that sends an email via SMTP to an Exchange Online mailbox and verifies receipt catches actual delivery failures regardless of what the status page says.


References