Our Microsoft Threat Check service helps you rapidly identify and mitigate security threats, vulnerabilities, and misconfigurations in your IT environments.
Microsoft Threat Check
Rapid security improvement
Overview
Identify security priorities
Using Microsoft technology, we perform non-intrusive monitoring of your systems over 2 weeks and deliver detailed factual findings, expert recommendations and actionable quick-wins to improve your security posture.
- 2-week non-intrusive monitoring
- Stakeholder call and detailed Threat Check report with risk-assessed findings prioritised by urgency
With our Microsoft Threat Check, you can quickly improve your cyber security with minimal effort and maximum impact.
Microsoft Funding
Are you eligible for Microsoft funding?
Some organisations may qualify for Microsoft funding to cover the full cost of our Microsoft Threat Check. Please ask us if you’d like us to check if you qualify.
Threat Check Benefits
Your benefits
- Rapid identification of active threats, vulnerabilities and misconfigurations
- Endpoint and Tenant visibility
- Stakeholder call to discuss findings
- Detailed Threat Check report with prioritised and actionable security recommendations
- Strategic advice to feed into security strategy and roadmap
What's covered?
Our Microsoft Threat Check is hassle-free. We enable a Microsoft 365 E5 licence in your environment to perform 2-week non-intrusive monitoring of your systems using the Microsoft E5 security toolset in monitoring mode. It’s fast, deployed remotely, and doesn’t require you to have an E5 licence. It couldn’t be easier.
Identities
We use Azure AD Identity Protection to look for risky users, compromised passwords and signs that your organisations identities are being used in suspicious ways.
Endpoints
We deploy Microsoft Defender for Endpoint in passive mode to selected endpoints in your organisation and use Defender Vulnerability Management to find weaknesses in your company’s devices and servers.
Apps
We use Microsoft Defender for Cloud Apps to gain insight into the apps and services being used by your users – with an emphasis on shadow IT and insider risk.
We use Microsoft Defender for Office 365 to look into threats within email, SharePoint and Teams. This also allows us to launch specially crafted attack simulations to test your employee vigilance against a variety of phishing tactics.
-
Identities
We use Azure AD Identity Protection to look for risky users, compromised passwords and signs that your organisations identities are being used in suspicious ways.
-
Endpoints
We deploy Microsoft Defender for Endpoint in passive mode to selected endpoints in your organisation and use Defender Vulnerability Management to find weaknesses in your company’s devices and servers.
-
Apps
We use Microsoft Defender for Cloud Apps to gain insight into the apps and services being used by your users – with an emphasis on shadow IT and insider risk.
-
Email
We use Microsoft Defender for Office 365 to look into threats within email, SharePoint and Teams. This also allows us to launch specially crafted attack simulations to test your employee vigilance against a variety of phishing tactics.
Microsoft Threat Check
Common findings
- Software vulnerabilities
- Unsupported hardware
- Insecure accounts
- Stale high-privilege accounts
- Insecure endpoint protection
- Local Admin passwords
- Platform misconfigurations (e.g. Azure, Azure AD, Exchange Online, SharePoint Online, Office 365, and Admin portals)
Some of our other services
Accreditations
Committed to the highest standards
We are members of the Microsoft Intelligent Security Association and one of the most accredited Microsoft security partners in the UK. Our range of accreditations means you can have confidence in our advanced security measures and commitment to delivering Microsoft-focused security services of the highest quality.
Frequently asked questions (FAQs)
-
Which areas does the Microsoft Threat Check cover across on-premises and cloud?
We’ll cover elements of both on-premise and cloud. We’ll look at any resources that exist in Azure, your Office 365 tenancy, and servers deployed on-premise or Active Directory on-premise. However, we will focus mainly on Identity, Applications, E-mail and Devices.
-
What are the benefits to my organisation?
In the Microsoft Threat Check assessment, we take all the data and telemetry we have from your audit, and deliver an evidence-based, prioritised list of recommendations that cover quick wins (i.e. really simple changes in your environment) that will immediately improve your security posture. We also provide you with longer-term strategy recommendations and next steps to further improve your security, while also highlighting parts of your Microsoft licensing that you might not be fully utilising.
-
How do you present the findings from the Microsoft Threat Check assessment?
We’ll issue you with a detailed written report on everything we’ve discovered. We also provide a prioritised list of recommendations at the top of the report, and an executive summary highlighting key findings. We’ll also arrange a call so you can discuss the findings with one of our security consultants. We will explain the findings and give you the opportunity to ask any questions, and ensure you get the maximum value from your assessment.
-
What Microsoft tooling do you use in the Microsoft Threat Check?
Our Microsoft Threat Check assessment uses Microsoft’s 365 E5 tooling. We use the Microsoft Defender stack and Azure Active Directory Identity Protection to gather telemetry and insights from your environment. This enables us to identify any threats, vulnerabilities and misconfigurations.
-
Will there be any disruption to our environment?
Everything we do is non-intrusive, so we deploy the tools in passive mode. So there won’t be any disruption or impact to your environment.