Microsoft 365 Security Assessment

Find out what attackers see
before they get in.

Most Microsoft 365 environments were set up quickly and never hardened. Weak conditional access, legacy authentication still enabled, no inbox rule monitoring, too many global admins. We review your entire environment and tell you exactly what needs to be fixed before an attacker finds it first.

Written Report Prioritized Remediation List Direct Engineer Briefing
Based in Connecticut Hands-on IR experience Written report delivered
M365 Environment Scan Assessment In Progress
Identity & Access
Legacy authentication protocols Enabled
Conditional Access policies Partial
MFA enforcement — all users 3 Gaps Found
Email & Audit Logging
Mailbox audit logging Disabled
Inbox rule alerts configured None
External email forwarding Blocked
Privileged Access
Global admin accounts 11 Assigned
$7M+Wire Fraud Disrupted Across Cases
30 minFree Initial Consultation
WrittenReport With Every Assessment
DirectBriefing With Your Engineer
What We Review

Every layer of your Microsoft 365 environment.

A real assessment goes beyond surface-level checks. We review the configurations, controls, and visibility gaps that attackers actually exploit.

🔑

Identity and Access

MFA enforcement, Conditional Access policies, legacy authentication, privileged account review, Entra ID role assignments, and guest access controls. Identity is the primary attack surface in every incident we have responded to.

✉️

Email Security

Inbox rules across all accounts, external forwarding settings, impersonation protections, phishing simulation history, anti-spoofing controls, and DMARC and SPF configuration. Email is still the number one entry point.

📊

Audit Logging and Visibility

Mailbox audit logging status and retention, unified audit log configuration, sign-in log review, risky user detection, and alert configuration. Without visibility, attacks go unnoticed for weeks.

👥

Privileged Access

Global administrator count, admin account hygiene, just-in-time access controls, service account review, and application permission audit. Over-permissioned accounts are the fastest path to a full tenant compromise.

💻

Endpoint and Device

Device compliance policies, Intune enrollment status, endpoint detection coverage, and device-based Conditional Access enforcement. Unmanaged devices are a common gap attackers exploit.

📄

SharePoint and OneDrive

External sharing settings, anonymous link policies, sensitive data exposure, and permission audit across SharePoint sites and OneDrive. Data exfiltration often starts here and goes undetected.

What You Get

A report that tells you what to fix, not just what is wrong.

01

Full Written Assessment Report

Every finding documented with context — what it is, why it matters, what an attacker would do with it, and exactly how to fix it. Not a checkbox compliance document. A practical guide to hardening your environment.

02

Prioritized Remediation Plan

Findings ranked by risk so you know what to fix first. High-severity gaps that create immediate exposure are separated from lower-risk configuration improvements. You always know what matters most.

03

Direct Engineer Briefing

A live walkthrough of the findings with the same engineer who ran the assessment. Not a canned presentation. A direct conversation about your environment, your risks, and the specific steps to address them.

04

Optional Remediation Support

If you want us to implement the fixes rather than hand off a report, we can. Conditional Access hardening, MFA enforcement, audit log setup, inbox rule alerting, and privilege reduction are all things we handle directly.

What We Typically Find

These are not edge cases. They show up in nearly every environment we assess.

High

Legacy authentication is still enabled

Allows attackers with valid credentials to bypass MFA entirely using older protocols like SMTP AUTH or IMAP. One of the most commonly exploited paths into Microsoft 365.

High

Too many global administrators

Most environments have far more Global Admin accounts than necessary. A compromised Global Admin gives an attacker the ability to modify security settings, create new accounts, and cover their tracks.

High

Mailbox audit logging disabled or retention too short

Without audit logs, there is no forensic record of what an attacker did inside a mailbox. This turns a manageable incident into an unresolvable one.

High

No alerts configured for inbox rule creation

Inbox rules are the primary persistence mechanism in BEC attacks. Alerts can be configured natively in Microsoft 365 in minutes. Most environments have never set them up.

Medium

Conditional Access policies missing or incomplete

MFA is enabled but Conditional Access is not configured. Attackers from unknown devices in foreign countries face no additional barriers beyond a password they already have.

Medium

External sharing unrestricted in SharePoint and OneDrive

Anonymous sharing links and unrestricted external access create data exfiltration paths that rarely trigger alerts. Sensitive client files are often accessible to anyone with a link.

Who This Is For

Built for firms where Microsoft 365 holds everything that matters.

⚖️

Law Firms

Client communications, trust accounts, litigation files, closing documents

📊

Accounting Firms

Tax data, financial records, client credentials, payroll information

🛡️

Insurance

PII, claims data, policy documents, regulatory compliance

🏠

Real Estate

Closing documents, wire instructions, buyer communications, title data

Already have an IT team or MSP? A security assessment is not a criticism of your IT provider. It is a specialized review that most IT teams do not have the tooling or training to perform. We work alongside your existing provider and share findings directly with them so remediation can happen fast.

What Clients Say

Trusted by Firms That Cannot Afford to Get It Wrong.

Firms that handle client money, sensitive data, and high-stakes transactions.

"

We brought Eric in on a complex DFIR engagement involving potential data exfiltration across SharePoint and OneDrive. The scope was significant and the timeline was tight. He worked through the forensic investigation methodically, identified what had been accessed, and gave us a clear picture of exposure before we had to make any reporting decisions. Exactly the kind of professional you want when the stakes are high.

Rachel V. - Attorney, Voss & Caldwell LLP, New York
"

After a phishing incident that nearly compromised a client wire transfer, we needed someone who understood both the technical side and the urgency. Eric contained it fast, explained every step clearly, and helped us put the right controls in place so it would not happen again. I would recommend him to any firm that takes client trust seriously.

Jay M. - Attorney, Merritt Law Group

Not sure if your environment is exposed?

Most firms are. A 30-minute free consultation will tell you where the biggest gaps are. No pitch, no obligation — just an honest look at where you stand.

Book Your Free Consultation
Written report delivered. Direct engineer briefing. Nationwide support.