Assessments

Structured, evidence-based assessments of your Microsoft environment. Each produces a prioritised findings report that maps directly to remediation actions.

Rapid M365 Baseline Check

Entry-level snapshot of your Microsoft 365 environment. Secure Score, Entra ID baselines and policy configurations reviewed and translated into an executive-ready findings summary.

  • Secure Score baseline and gap summary
  • Entra ID identity configuration review
  • Critical policy gap identification
  • Executive findings report
  • Prioritised remediation shortlist
Discuss this assessment

Zero Trust Architecture Audit

Premium deep-dive into identity and access management. Conditional Access policies, Privileged Identity Management roles and risky sign-in behaviours assessed against Microsoft Zero Trust principles.

  • Conditional Access policy inventory and gap analysis
  • PIM role and privilege review
  • Risky user and sign-in behaviour report
  • Zero Trust gap analysis
  • Prioritised remediation roadmap
Discuss this assessment

Cyber Essentials 2026 Readiness

Maps your M365, Intune and Defender configurations to IASME's April 2026 Cyber Essentials standards — including stricter 14-day patching enforcement and mandatory MFA across all cloud services.

  • Automated evidence gathering from Intune and Defender
  • Mapping to April 2026 IASME question set
  • Blocking issue identification before formal audit
  • Remediation action plan with effort estimates
  • CE/CE+ submission support
Discuss this assessment

Licensing ROI & Benchmarking

Graph API telemetry reveals which premium features your organisation is actually using. Adoption benchmarked against industry norms to identify consolidation opportunities and eliminate waste.

  • Feature usage extraction via Graph API
  • Licence utilisation report
  • Industry benchmark comparison
  • Third-party tool consolidation opportunities
  • Cost-optimisation strategy report
Discuss this assessment

Remediation Sprints

Fixed-price implementation blocks mapped directly to assessment findings. Defined scope, defined deliverables, no scope creep. Each block closes a specific category of risk identified in your assessment report.

Identity & Access Lockdown

Triggered when assessment detects legacy authentication or missing MFA.

  • Disable legacy authentication protocols globally
  • 3–5 Conditional Access policies deployed (MFA, risk-based, admin restrictions)
  • Self-service password reset (SSPR) configured
  • Azure AD Identity Protection enabled (Business Premium / E5)
Discuss this sprint

Secure Device & Endpoint

Triggered when assessment detects unmanaged devices or missing endpoint security policies.

  • Windows/Mac device enrolment into Microsoft Intune
  • Compliance policy enforcing OS updates within 14 days
  • BitLocker encryption with Entra ID key escrow
  • Defender for Business ASR rules and Next-Gen AV policies
Discuss this sprint

Email Defense & Anti-Phishing

Triggered when assessment flags missing SPF/DKIM/DMARC or weak Exchange Online Protection settings.

  • SPF, DKIM and DMARC configured to quarantine/reject policy
  • Defender for Office 365: Safe Links, Safe Attachments, Anti-Phishing
  • External email warning tags enabled
  • Auto-forwarding to external domains blocked
Discuss this sprint

Data Protection Baseline

Triggered when assessment reveals uncontrolled data sharing or missing retention labels.

  • DLP policies for UK financial data (credit cards, sort codes)
  • SharePoint and Teams external sharing restrictions
  • Sensitivity labels: Public / Internal / Confidential
  • Baseline retention labels applied
Discuss this sprint

Not sure which service fits?

Tell us your situation. We'll give you a straight answer — no sales process required.

Get in touch