Microsoft Tenant Assessment

Our Microsoft Tenant Assessment gives you clear insights into the security and configuration of your Microsoft 365 environment. We identify risks, optimize settings and strengthen your cloud security in the long term.

Do these questions also concern you?

Microsoft 365 has been introduced, but is the environment efficiently aligned?

Purpose of the assessment

Protect your Microsoft 365 cloud environment and set up for the future

Carrying out an in-depth analysis of settings and services

All results are evaluated and presented according to A-B-C criteria .

This results in corresponding recommendations for action, which can be implemented at the company's own discretion.

Your profit

Protection of sensitive data.

Protecting sensitive data is at the heart of any secure IT strategy. By eliminating vulnerabilities in a targeted manner, you can significantly increase the security of your entire Microsoft 365 environment.
Sensitive company data is a valuable asset - it must be identified, its flow tracked and its protection consistently ensured. It is crucial to know who, when, where, why and how this data is accessed and in what form it is processed.

Zero Trust.

Trust is good - control is better. The Zero Trust principle follows the principle of "trust no one" and reduces risks by minimizing rights and authorizations. The fewer access rights users and applications have, the better your company data is protected. This data-centric approach is based on precisely defined roles, resources and applications, which significantly improves the protection of your Microsoft environment.
Third-party services - frequent gateways for attacks - are also comprehensively checked as part of this approach.

Lean Management & Continuous Improvement.

Lean processes and continuous development are crucial for sustainable success. By avoiding and eliminating wasted resources, costs are reduced and efficiency is increased. At the same time, the performance of your IT environment improves, while lifecycle costs are minimized.
As framework conditions and requirements are constantly changing, regular adjustments and reviews are essential - this is the only way to keep your processes optimized and future-proof in the long term.

Extract from the scope of analysis

Global Tenant Settings & Security Management

  • General review of compliance-critical settings, current user rights and global user and group policies, based on a best-practice approach.
  • Other areas include mobile devices, Defender Services (if licensed) and checking for current security incidents. If required,
    can also check hybrid infrastructures.

Teams, SharePoint & OneDrive

  • Guidelines for sharing functions, guidelines for collaboration with external employees are reviewed
  • Files shared externally
  • Activity analysis of the current SharePoint sites
  • Activity analysis for Microsoft Teams

Exchange Online/Server

  • General analysis of the Exchange settings, the mail server and, if required, the hybrid configuration.
  • Checking patches and security policies as well as global mailbox settings such as mailbox auditing

 

Azure Active Directory

  • Review of password and authentication policies (such as multi-factor), service principals
  • Verification of password and authentication policies (such as multi-factor), service principals
  • Analysis of the enterprise applications. Guest authorizations and access by external users are also checked.

Current magazine articles on the topic of IT security

social engineering
IT security
What actually is social engineering?
From a seemingly harmless text message to a sophisticated phishing campaign—how attackers exploit employees' weaknesses and trust to achieve their goals.
Read more
Red Teaming 32 1
IT security
What is Red Teaming and for whom is it useful?
In this article, we explain the advantages of red teaming and show you which companies this special form of pentesting is suitable for.
Read more
WEAKNESS ANALYSIS32
IT security
Why should vulnerability analysis also be an issue for SMEs?
More than half of all SMEs in Germany have already been victims of a cyberattack, with financial losses running into the millions depending on the extent of the attack.
Read more

Would you like more information about Microsoft Tenant Assessment?

Then simply get in touch with our experts.

csm nicolas roesener e35f74755d
Nikolas Rösener
Security Expert