Stale & Inactive Accounts
Identify user accounts that have not signed in for 30, 60, or 90 days, disabled accounts still holding licenses, and accounts for departed employees.
Your identity layer is the front door to everything. We audit your entire Entra ID environment, from user accounts and MFA to Conditional Access and privileged roles, and give you a clear remediation plan before attackers find the gaps.
Over 80% of breaches involve compromised credentials. Without proper Entra ID hardening, every user account is a potential entry point into your entire Microsoft 365 environment.
Too many Global Admins with no MFA and no PIM is one of the most common and dangerous misconfigurations we see across Microsoft 365 tenants.
Most tenants have Conditional Access policies set to Report-Only or missing entire platforms, leaving real access routes completely unprotected.
Unresolved risky sign-ins and Identity Protection alerts sit in the portal for months, giving attackers persistent access that goes unnoticed.
We go deep into every layer of your identity and access setup, document every finding with evidence, and prioritize what needs fixing first.
We review all user accounts for stale identities, licensing mismatches, inactive accounts, and naming inconsistencies that create management and security problems over time.
Identify user accounts that have not signed in for 30, 60, or 90 days, disabled accounts still holding licenses, and accounts for departed employees.
Review UPN format alignment with the primary domain, inconsistencies between display names, mail attributes, and UPNs that cause issues with Teams and Outlook.
Check SSPR registration rates, authentication method configuration, and whether SSPR bypass risks are properly controlled across user populations.
Identify users with duplicate licenses, group-based vs direct assignment conflicts, and users assigned premium licenses they do not need or use.
Review Azure AD Connect sync health, synchronization errors, password hash sync vs pass-through authentication, and seamless SSO configuration status.
Audit dynamic membership rules, empty or redundant groups, nested group depth that causes performance issues, and groups with no owners assigned.
We audit your full authentication stack, from per-user MFA and Security Defaults to modern authentication methods and passwordless readiness across the tenant.
Identify users with no MFA method registered, accounts using only SMS (vulnerable to SIM swap), and whether registration enforcement is in place via Conditional Access.
Review the Authentication Methods Policy for which methods are enabled (Authenticator, FIDO2, SMS, Voice), method targeting, and whether legacy per-user MFA is still in use.
Check whether legacy authentication protocols (Basic Auth, SMTP Auth, IMAP, POP3) are blocked for all users via Conditional Access or tenant-level policy.
Determine whether Security Defaults should be replaced by Conditional Access policies for more granular control, and identify any configuration conflicts between the two.
Review number matching, additional context features, and whether users are protected against MFA fatigue attacks through push notification configuration.
Assess readiness for FIDO2 security keys or Windows Hello for Business deployment, including device registration state and policy prerequisites.
We perform a full review of every Conditional Access policy, checking coverage gaps, report-only policies, exclusion overuse, and missing baseline protections that leave your tenant exposed.
Identify all policies in Report-Only mode that are not actually enforcing, and assess the risk of switching them to Enabled without breaking legitimate access flows.
Review emergency access account configuration, break-glass account exclusions, and whether service account exclusions are tightly scoped or overly broad.
Audit named location definitions, trusted IP ranges, country-based access restrictions, and whether location-based policies are correctly scoped to the intended user groups.
Validate that key workloads like Exchange Online and SharePoint require compliant or Hybrid Azure AD joined devices, and that BYOD access is properly restricted.
Check whether Identity Protection risk-based Conditional Access policies are configured to require MFA for medium risk and block access for high risk sign-ins and users.
Review whether high-value apps like Exchange Online, SharePoint, Teams Admin, and Azure Portal have dedicated policies enforcing stricter controls than general user access.
We audit all role assignments across Entra ID, checking for over-privileged accounts, permanent assignments that should be time-bound, and service principals with excessive permissions.
Identify all accounts with Global Administrator role, verify each has MFA enforced, and flag where the count exceeds the recommended maximum of 2 to 4 accounts.
Review PIM configuration for eligible vs permanent role assignments, activation requirements (MFA, justification, approval), and whether PIM access reviews are scheduled.
Review all directory role assignments to identify users with Global Admin when a scoped role like User Administrator or Exchange Administrator would suffice.
Audit app registrations and enterprise applications with application-level permissions (not delegated), especially those with Mail.ReadWrite, Files.ReadWrite.All, or directory roles.
Check whether Entra ID Access Reviews are configured for privileged roles, group memberships, and guest access to ensure ongoing access is periodically re-certified.
Assess whether Administrative Units are used to restrict helpdesk and delegated admin scope, and identify admin accounts with tenant-wide permissions that should be scoped.
We audit all external identities in your tenant, reviewing guest permissions, invitation policies, and lifecycle management to ensure external access does not become a long-term security liability.
Identify guest accounts with no sign-in activity for 30, 60, or 90 days, guests from domains that are no longer business partners, and guests who have never accepted their invitation.
Review who can invite guests to the tenant, whether non-admin users can invite externals, and whether invitation settings comply with your organization's sharing policy.
Check whether Conditional Access policies enforce MFA for guest accounts, and whether guests can access SharePoint, Teams, or email without meeting compliance requirements.
Audit the default guest permissions setting in Entra ID to ensure guests have restricted access to the directory and cannot enumerate users, groups, or other tenant properties.
Review Entra External Identities cross-tenant access policies, trusted MFA and compliant device claims for specific partner tenants, and B2B direct connect configuration.
Verify that Entra ID Access Reviews are scheduled for guest memberships in Teams and Microsoft 365 Groups, with automatic removal for guests who fail to confirm access.
Every Entra ID health check concludes with a structured set of deliverables designed to give you clarity, evidence, and a clear path forward.
A concise 2-page overview of your identity security posture, key risk areas, and recommended priorities for leadership and stakeholders.
Every finding documented with screenshots, evidence, severity ratings, and affected resources. Organized by audit category with clear before-and-after context.
A ranked action list with step-by-step fix instructions. Critical items first, then high, medium, and low. Each item includes estimated effort and compliance mapping.
A 60-minute video walkthrough of all findings. Share it with your team, IT leadership, or compliance officers. Available on-demand after the session.
Our audit is non-invasive and read-only. Here is what we need to get started, and what you can expect from the process.
We never make changes to your tenant during the audit. All access is read-only, time-bound, and revoked immediately after the engagement is complete.
Temporary read-only access to your Entra ID tenant. We provide the exact steps to assign and revoke.
A brief call to understand your license tier, hybrid setup, and any specific identity concerns before the audit.
The audit runs silently against your tenant. No user impact, no downtime, no configuration changes during the review.
After the audit completes, expect the full findings report and remediation plan in your inbox within one business day.
A structured, low-disruption audit process that gives you a clear picture of your Entra ID posture and exactly what to fix.
We learn your license tier, hybrid setup, and identity requirements to scope the audit and set the right expectations upfront.
30 minutesWe perform a read-only review of your tenant covering users, MFA, Conditional Access, roles, guests, and Identity Protection signals.
2 to 4 hoursYou receive a detailed health check report with every finding categorized by severity, with screenshots and recommended actions.
Within 24 hoursWe walk you through the findings, prioritize the critical fixes, and give you an action plan or handle the remediation directly.
60 minutesClients Served
Satisfaction Rate
Average Turnaround
Languages Supported
A health check finds the gaps. Our Microsoft 365 Managed Support Retainer keeps them closed — with continuous Entra ID oversight, proactive monitoring, and expert management across your entire M365 environment.
Your Entra ID health check is included free with any Priority or Partner retainer plan.
Entra ID is the front door, but your Microsoft 365 environment has many more rooms. Pair your identity audit with these complementary assessments.
Your Entra ID audit pairs perfectly with a full security review covering Defender, DLP, anti-phishing, and compliance policies across all Microsoft 365 workloads.
View Assessment Assessment #4Want the complete picture? Our full tenant audit covers all 6 pillars including Entra ID, Exchange, SharePoint, Teams, Intune, and Security in one engagement.
View Assessment Assessment #3Identity and device compliance go hand-in-hand. Conditional Access policies depend on Intune compliance. Audit both for a complete Zero Trust foundation.
View AssessmentEverything you need to know before booking your identity security audit.