Precursor Security
CREST Accredited

Microsoft 365 Security Assessment

Microsoft 365 is the most targeted SaaS platform in the world. Our CREST-accredited testers assess Entra ID Conditional Access policies, Exchange Online mail flow rules, SharePoint sharing configurations, Teams guest access controls, and Intune compliance policies to identify the misconfigurations that allow business email compromise, data exfiltration, and lateral movement across your M365 tenant.

CREST Accredited security assessment
Entra ID and Conditional Access specialists
Exchange Online and SharePoint security review
Board-ready executive summary and compliance mapping
From £3,750. Fixed-price quotes.
Scroll
Testing Methodology

M365 Security Assessment Coverage

We review every layer of your Microsoft 365 tenant: identity, mail, collaboration, endpoint, and information protection. Identifying the exploitable chains that Secure Score cannot surface.

Identity and Access

Entra ID and Conditional Access

We test every Conditional Access policy gap an attacker can exploit. Coverage includes legacy authentication bypass via IMAP, POP3, and SMTP, MFA policy gaps across user populations, PIM just-in-time role activation controls, B2B and B2C guest trust boundaries, and risky sign-in policy effectiveness. We enumerate every bypass path that allows a credential-only attack to succeed against accounts that should be MFA-protected.

Mail Security

Exchange Online Security

Mail flow rule misconfigurations are the leading enabler of business email compromise. We review SendAs and Full Access delegated mailbox permissions, auto-forwarding rules exfiltrating email externally, OAuth app consent grants with mail read/write scopes, and EOP and Defender for Office 365 anti-spoofing configuration.

Collaboration Security

SharePoint and OneDrive

Oversharing is the default posture for most M365 tenants. We assess organisation-wide sharing policies, the prevalence of anonymous sharing links, external domain access controls, site-level permission inheritance breaks, and sensitivity label application to understand how much data is accessible to guest users and unauthenticated external parties.

Collaboration Platform

Teams Security

Teams is increasingly used as an initial access vector via phishing and external federation abuse. We review guest access policies, external federation allow-lists, channel permissions, third-party app permissions within Teams, meeting recording compliance policies, and whether external participants can exfiltrate meeting content or access internal channels beyond their intended scope.

Device Management

Intune and Endpoint Management

Intune compliance policies gate device access to M365 resources, but only if configured correctly. We assess device compliance policy logic, enrollment restriction gaps, Conditional Access integration for device compliance, app protection policies for unmanaged devices, and conditional launch controls that determine whether a non-compliant device can access corporate data from a personal handset.

Information Protection

Microsoft Purview and AIP

DLP policies only protect data they can classify. We review DLP policy coverage and bypass paths, sensitivity label application consistency, Azure Information Protection encryption configuration, insider risk policy scope, and eDiscovery access controls that could expose all organisational data to an overprivileged compliance administrator.

Threat Intelligence

Microsoft 365 Risk Profile

M365 is the primary attack surface for credential theft, business email compromise, and data exfiltration targeting UK organisations. The misconfigurations we find are systematic, not exceptional.

High Risk
91%

BEC Attack Vector

Of cyber attacks start with a phishing email targeting M365 credentials, making tenant configuration the primary business risk control.

Medium Risk
73%

OAuth App Exposure

Of M365 tenants we assess have at least one overpermissive OAuth app consent grant with mail read/write or file access to all users.

Compliant
100%

Framework Coverage

Every finding is mapped to industry standard security benchmarks, ISO 27001, SOC 2, and Cyber Essentials Plus controls, providing direct audit evidence.

Mapped
Controls
Industry BenchmarksM365 Controls
ISO 27001A.8.8 / A.8.25
SOC 2CC6.1 / CC6.6
CE PlusCloud Scope
Sample Findings

What We Find in M365 Tenants

Representative findings from recent Microsoft 365 security assessments. These are not edge cases. They are the default misconfiguration posture for most tenants.

Critical
OAuth / Entra ID

Overpermissive OAuth Application Consent Grant

A third-party OAuth application had been granted Mail.ReadWrite and Files.ReadWrite.All permissions via admin consent. The application publisher's domain had expired, allowing potential domain takeover and full mailbox and OneDrive access for all users in the tenant without any further authentication.

CVSS 9.1NIST IA-2MITRE T1528

Business Impact: Full read/write access to every user's email and OneDrive files via a compromised third-party OAuth application. No user interaction required.

High
Conditional Access / MFA

Conditional Access Bypass via Legacy Authentication

Legacy authentication protocols (IMAP, SMTP, POP3) were not blocked by Conditional Access policies. Attackers with valid credentials obtained via phishing could bypass MFA enforcement using legacy mail clients, enabling full mailbox access and data exfiltration without triggering an MFA challenge.

CVSS 7.8NIST SC-8MITRE T1078

Business Impact: Complete MFA bypass for any compromised account, enabling business email compromise and data exfiltration without triggering MFA challenges or Entra ID sign-in risk policies.

Assessment Scope

Platform Coverage

Every M365 workload in scope, from identity to information protection.

Entra ID

  • Conditional Access
  • PIM / RBAC
  • B2B and B2C Trust
  • Risky Sign-ins

Exchange Online

  • Mail Flow Rules
  • Delegated Access
  • EOP Configuration
  • Defender for Office 365

SharePoint Online

  • Sharing Policies
  • External Access
  • Site Permissions
  • Sensitivity Labels

OneDrive

  • Sharing Settings
  • Sync Policies
  • Conditional Access
  • External Sharing Links

Microsoft Teams

  • Guest Access
  • External Federation
  • App Permissions
  • Meeting Policies

Intune

  • Compliance Policies
  • Enrollment Restrictions
  • App Protection
  • Conditional Launch

Microsoft Purview

  • DLP Policies
  • Sensitivity Labels
  • Insider Risk
  • eDiscovery Access

Azure Information Protection

  • Classification Rules
  • Label Inheritance
  • Encryption Config
  • Rights Management
Qualification Check

You need an M365 assessment if...

You have experienced a business email compromise attempt or phishing campaign targeting your M365 tenant.

Your organisation has grown its M365 footprint with new workloads (Teams, Intune, Purview) that have never been independently reviewed for security configuration.

Your Board or CISO has requested evidence of M365 security posture validation beyond the Microsoft Secure Score dashboard.

A compliance requirement such as Cyber Essentials Plus or ISO 27001 has flagged cloud configuration as an audit control gap.

You have completed a post-phishing incident review and want to confirm whether tenant-level misconfigurations were exploited or remain exploitable.

You are migrating to M365 E5 and want to validate that newly activated security features (Defender, Purview, Entra ID P2) are configured correctly before they are relied upon.

Certifications

Compliance Ready

Every finding is mapped to industry standard security benchmark controls for Microsoft 365. Our reports satisfy audit evidence requirements for ISO 27001, SOC 2, Cyber Essentials Plus, and GDPR technical security obligations.

CREST
SC-300
AZ-500
CHECK

Industry Benchmarks

Full benchmark coverage for M365. Every finding references the specific control and remediation recommendation.

ISO 27001

Mapped to Annex A.8.8 (technical vulnerability management) and A.8.25 (secure development lifecycle for SaaS).

SOC 2

Findings reference CC6.1 (logical access controls) and CC6.6 (external network transmission controls).

Cyber Essentials Plus

Covers cloud-hosted services in CE Plus scope. Our report provides the configuration evidence auditors require.

GDPR

Identifies oversharing configurations that create personal data exposure risk under UK GDPR Article 32 obligations.

Cyber Insurance

Increasingly required by major UK underwriters for M365-heavy organisations above £1M coverage threshold.

Engagement Pipeline

M365 Assessment Workflow

Four phases from scoping to compliance-ready report, with no operational disruption to your M365 environment.

Step 01

Scoping and Access Provisioning

We define the tenant scope, agree which M365 workloads are in scope, and provision Global Reader and Security Reader roles. A fixed-price quote is issued after a free 30-minute scoping call with no commitment required.

OutputFixed-Price Quote
Step 02

Tenant Configuration Review

Our testers systematically review Entra ID Conditional Access policies, Exchange Online mail flow and delegation settings, SharePoint and OneDrive sharing configurations, Teams external access, Intune compliance policies, and Purview information protection settings against industry standard security benchmarks.

OutputConfiguration Baseline
Step 03

Exploitation and Bypass Testing

We attempt to chain configuration findings into exploitable attack paths: Conditional Access bypass via legacy authentication, OAuth consent abuse, anonymous sharing link exploitation, and privilege escalation through overpermissive role assignments.

OutputLive Critical Alerts
Step 04

Report and Retest

You receive a prioritised findings report, a board-ready executive summary with business risk context, and a technical remediation guide with step-by-step fixes.

OutputCompliance-Ready Report
Report Package

What You Receive

Every M365 assessment produces a complete report package designed for both technical remediation teams and board-level decision makers.

Board-Ready Executive Summary

A non-technical summary of M365 security posture, business risk context, and prioritised remediation recommendations suitable for CISO and board presentation.

Technical Remediation Guide

Step-by-step remediation instructions for every finding, with CVSS scores and PowerShell or portal configuration guidance.

Industry Benchmark Mapping

Every finding is mapped to industry standard security benchmarks, enabling direct evidence submission for compliance audits including ISO 27001 and Cyber Essentials Plus.

Retest of Remediated Findings

After you apply the recommended fixes, we retest every critical and high finding within the assessment window at no additional cost to provide closure evidence for your compliance or cyber insurance requirements.

Transparent Pricing

M365 Security Assessment Pricing

Fixed-price engagements. No day-rate overruns. All tiers include CREST-accredited testers, industry standard benchmark mapping, and a full retest of remediated findings.

After the Assessment

Close the Loop.
After the Test.

Your M365 assessment identifies what is misconfigured today. We feed those exact findings into our 24/7 Cloud Security Monitoring service, building custom detection rules for the Conditional Access bypass paths and OAuth abuse techniques discovered during your assessment.

Explore Defensive Services
Service Catalogue

Full Penetration Testing Catalogue

Comprehensive penetration testing services tailored to your environment.

Ready to Secure

The best time to test your defences is now.

Join the high-growth companies relying on Precursor for continuous offensive and defensive security.

CREST Triple Accredited|Fixed Price Quotes|Free Scoping Call|UK Based Team

Frequently Asked Questions

Common questions about this service, methodologies, and deliverables.

A Microsoft 365 security assessment is a specialist manual review of your M365 tenant conducted by CREST-accredited consultants. Unlike Microsoft Secure Score, which provides an automated compliance score, a manual assessment identifies exploitable misconfigurations that automated tools cannot detect, such as Conditional Access bypass paths via legacy authentication protocols, overpermissive OAuth application consent grants, and mail forwarding rules silently exfiltrating email to external addresses. Our testers assess every layer of your M365 environment: Entra ID Conditional Access policies, Exchange Online mail flow and delegation settings, SharePoint and OneDrive sharing configurations, Teams external access controls, Intune device compliance policies, and Microsoft Purview information protection settings. The output is a prioritised findings report mapped to industry standard security benchmarks, with a board-ready executive summary and a technical remediation guide.

Our M365 security assessment covers the full suite of Microsoft 365 services: Entra ID (Conditional Access, PIM, B2B/B2C trust, risky sign-in policies), Exchange Online (mail flow rules, delegated access, OAuth app consent, auto-forwarding, EOP and Defender for Office 365 configuration), SharePoint Online and OneDrive (sharing policies, external access, anonymous links, site-level permissions, sensitivity labels), Microsoft Teams (guest access, external federation, app permissions, meeting policies, compliance recording), Intune and Microsoft Endpoint Manager (device compliance policies, enrollment restrictions, app protection policies, conditional launch controls), Microsoft Purview (DLP policies, sensitivity labels, insider risk policies, eDiscovery access controls), and Azure Information Protection (classification rules, label inheritance, encryption configuration, rights management). The specific workloads assessed are agreed during scoping and depend on which M365 services your organisation has licensed and deployed.

Our testers require read-only administrative access to your M365 tenant. The minimum roles required are Global Reader and Security Reader, which provide read access to all configuration settings without granting any write or administrative capability. We do not require Global Administrator access. For Intune assessments, the Intune Service Administrator (read-only) role may be added. All access is provisioned before the engagement, documented in a signed Scope of Work, and the accounts are disabled or removed at the end of the engagement. No changes are made to your tenant configuration during the assessment. We operate in a purely read-only posture unless you specifically request that we attempt active exploitation under controlled conditions (available as an optional add-on to the standard review).

A Microsoft 365 security assessment starts from £3,750 for a single tenant with up to 500 users, covering the core workloads: Entra ID, Exchange Online, SharePoint, OneDrive, and Teams. Larger tenants with 500 to 2,000 users and additional workloads such as Intune and Microsoft Purview typically cost between £6,250 and £10,000. Multi-tenant environments or engagements requiring active exploitation testing are quoted separately after scoping. All engagements are fixed-price: the quote you receive after a free scoping call is the amount you pay, with no day-rate overruns. A retest of remediated findings is included in all engagements.

Microsoft Secure Score is a dashboard metric that tracks your organisation's adherence to Microsoft's recommended configuration settings. It identifies low-hanging configuration weaknesses and provides actionable recommendations, but it has significant limitations as a security assurance tool. Secure Score cannot detect exploitable attack chains, such as a Conditional Access policy that appears correctly configured but has a legacy authentication exclusion that bypasses MFA for a subset of high-privilege accounts. It cannot identify overpermissive OAuth application consent grants that give third-party apps full mailbox and OneDrive access. It cannot assess whether mail forwarding rules are silently exfiltrating email to external addresses. And it cannot evaluate the business risk of a SharePoint sharing policy that exposes sensitive files to anonymous links with no expiry. A manual assessment by CREST-accredited testers identifies these exploitable chains and provides a prioritised remediation roadmap that Secure Score alone cannot produce.

Yes. Conditional Access testing and legacy authentication bypass are primary focus areas in every M365 assessment. We enumerate every Conditional Access policy in your tenant, map which users and applications are in scope or excluded, and identify gaps where an attacker with valid credentials could authenticate without completing an MFA challenge. The most common bypass path we identify is legacy authentication protocol support: when IMAP, POP3, POP, SMTP, MAPI, and Exchange ActiveSync are not blocked by Conditional Access, an attacker who obtains valid credentials via phishing can authenticate directly to Exchange using a legacy mail client without triggering an MFA challenge. We also test for named location exclusions, device platform exclusions, and service principal exemptions that create unintended bypass paths. Every Conditional Access gap is documented with a proof-of-concept attack scenario, business impact description, and specific remediation steps aligned to industry standard security benchmarks.