M365 Security Assessment

The default security configurations in M365 are unlikely to adequately protect the data and identities within an organisation. Razorthorn’s M365 Security Assessment helps you to re-evaluate your M365 security settings to ensure they align with your risk tolerance and threat models based on attackers’ interest in their organisation.

In its default state, the M365 platform is an easy to use collaboration platform designed for organisations not typically under threat from advanced adversaries and who don’t need the complexity of strict data protection policies. However, when migrating to M365 services such as Exchange Online and SharePoint Online, few address the security details of these services.

M365 has more than 7500 configurable settings PER USER within the M365 tenants. Most organisations have not changed the high risk default settings provided by Microsoft. Razorthorn provides the most in depth security assessment and remediation engine available for M365 today.

Razorthorn offers both point-in-time and continuous security scanning options for our customers, providing immediate security recommendations for hardening your M365 services and user settings.

Questions Razorthorn Can Help to Answer

  • How are you enforcing your security policies in your M365 environment?
  • How are you detecting misconfigurations in M365?
  • How do you ensure security compliance when adding and removing users?

Benefits of the M365 Security Assessment

Threat intelligence - M365 Security Assessment

Go beyond the constraints of the Security and Compliance Centre with insights gained from real-world attacks and intensive M365 red team experience

Default settings

Detect misconfigurations and high-risk default settings

Project plans

Create actionable project plans for remediation

Policy correlation

Conditional access policy correlation

Change detection

Establish secure baselines for change detection

Privileged service admin account integrity

Privileged service admin account integrity

Trust settings

Transitive trust settings between Teams and SharePoint

Dashboard - M365 Security Assessment

Optional SIEM Integrations, so that SOC teams can significantly reduce their M365 event ingestion load, saving SIEM resources for other logging and alerting tasks.

The Razorthorn Approach

Our team of M365 security experts collaborates with researchers around the world to identify M365 security weaknesses. This includes taking the baseline settings from the Microsoft 365 Security and Compliance Centre, combining them with recommendations from industry leaders, such as the Centre for Internet Security, and then adding our own independent research to look at hundreds of security settings that no other Security Posture Management Platform offers.

Our scanning tools identify M365 security settings that can enable attackers to gain unauthorised access to data and identities. The scans can be run under the organisation’s full control and the scans are also read-only, making no changes to a tenant’s settings.

The outcome of the scan is a customised roadmap for prioritising and then optimising security settings. In less than a day, an organisation can go from being completely unaware of significant security problems to being fully informed, with clear guidance on how to reduce M365 security risks across all of M365’s cloud-based services.

By running these scans, it is significantly less likely to suffer an M365 security incident, such as ransomware delivery, through Sharepoint or Exchange Online, or through Single Sign-On authentication incidents due to Azure Active Directory weaknesses.

M365 Security Assessment Enquiry

Our security experts provide you with a hassle-free way to identify any security weaknesses and threats to your data and identities within your M365 environment. Get in touch to arrange an initial chat.

  • This field is for validation purposes and should be left unchanged.

Searching for Additional Cloud Security Reviews?

AWS Security Review

AWS Security Review

Azure Security Review

Microsoft Azure
Security Review

Google Workspace Security Review

Google Workspace
Security Review

Follow Us