Security & Compliance Health Check | MStack360 - Microsoft 365 Security Audit

Choose Your Security Focus Area

Each area below is a deep dive into a critical part of your Microsoft 365 security. Select the one your organization needs most, or let us run the full audit.

HIPAA PCI-DSS GDPR NIS2 SOC 2

Intune & Device Management Audit

We assess every aspect of your endpoint management, from enrollment status to compliance policies, app deployment, and device security configurations.

Best for: BYOD & Remote Teams

Device Enrollment

Verify enrollment status across all platforms, identify unmanaged devices, and review autopilot configuration.

Compliance Policies

Audit compliance rules for password, encryption, OS version, and jailbreak detection across all device types.

App Protection

Review app protection policies for managed and unmanaged apps, data leakage prevention, and container isolation.

Configuration Profiles

Check Wi-Fi, VPN, email, and restriction profiles for conflicts, gaps, and assignment accuracy.

Update Rings

Evaluate Windows update rings, feature update deferrals, and driver update policies for security patching.

Reporting & Remediation

Analyze device health trends, non compliance patterns, and build a remediation priority list.

Conditional Access Policy Audit

We review every Conditional Access policy, identify gaps in coverage, and ensure your zero trust posture is solid across users, devices, locations, and risk levels.

Best for: Hybrid & Multi Location Orgs

Policy Coverage Map

We map every CA policy to ensure all users, apps, and scenarios are covered with no blind spots.

MFA Enforcement

Verify MFA is required for all critical scenarios: admin portals, external access, risky sign ins, and legacy protocols.

Location & Network

Review named locations, trusted networks, and geo blocking rules to protect against unauthorized access.

Risk Based Policies

Check if sign in risk and user risk policies are enabled and configured correctly with Identity Protection.

Device Compliance Gates

Ensure only compliant and managed devices can access corporate data through proper device trust policies.

Session Controls

Review session lifetime, persistent browser controls, and app enforced restrictions for sensitive applications.

Anti Spam & Anti Phishing Audit

We examine your entire email security stack including Exchange Online Protection, Defender for Office 365 policies, and authentication records to stop threats before they reach your inbox.

Best for: Every Organization

SPF, DKIM & DMARC

Validate all email authentication records to prevent spoofing and improve deliverability across all domains.

Anti Phishing Policies

Review impersonation protection, mailbox intelligence, and spoof intelligence to block targeted phishing attacks.

Anti Spam Filtering

Assess spam filter thresholds, allowed and blocked senders, quarantine policies, and end user spam notifications.

Safe Attachments

Check if Safe Attachments is enabled with detonation chamber scanning for all inbound and internal emails.

Safe Links

Verify URL rewriting and time of click protection across email, Teams, and Office applications.

Threat Intelligence

Review alert policies, threat explorer usage, and automated investigation and response configurations.

Data Loss Prevention Audit

We evaluate your DLP policies, sensitivity labels, and information barriers to ensure confidential data stays within the right boundaries across email, SharePoint, Teams, and endpoints.

Best for: Healthcare, Finance & Legal

DLP Policy Review

Audit all DLP rules across Exchange, SharePoint, OneDrive, and Teams for proper sensitive data detection.

Sensitivity Labels

Check label taxonomy, auto labeling rules, and whether labels are applied consistently across documents and emails.

Sensitive Info Types

Verify detection of credit card numbers, SSNs, health records, and custom patterns specific to your industry.

Policy Tips & Alerts

Review user notifications, admin alerts, and incident reports to ensure violations are visible and actionable.

Endpoint DLP

Assess endpoint DLP coverage for copy to USB, print, upload, and clipboard restrictions on managed devices.

Compliance Reporting

Evaluate audit log coverage, retention labels, and compliance manager scores for regulatory readiness.

Identity & Entra ID Audit

We audit your Entra ID (Azure AD) configuration including user lifecycle, role assignments, app registrations, and hybrid identity to ensure your identity foundation is rock solid.

Best for: Growing & Enterprise Teams

User & Group Hygiene

Identify stale accounts, disabled users still licensed, orphaned guests, and group membership sprawl.

Admin Role Review

Audit Global Admin count, role assignments, and ensure least privilege access with PIM eligibility.

Authentication Methods

Review registered MFA methods, passwordless adoption, FIDO2 keys, and legacy authentication blocking.

App Registrations

Discover expired secrets, overprivileged apps, and consented third party applications with broad access.

Hybrid Identity

Check Azure AD Connect sync health, password hash sync, seamless SSO, and pass through authentication.

License Optimization

Identify unused licenses, double assignments, and opportunities to right size your Microsoft 365 spend.

Clear Deliverables With Every Audit

Every Security & Compliance Health Check ends with structured documentation and a live session to ensure you can act on what we find.

Executive Summary

A concise brief for leadership covering overall risk score, critical findings, and the top actions needed to improve your security posture.

Detailed Findings Report

Full audit results across all selected focus areas — Intune, Conditional Access, Email Security, DLP, and Identity — with severity ratings and evidence for each finding.

Prioritized Remediation Plan

A step-by-step action plan organized by severity — Critical, High, Medium — linking each finding to specific remediation guidance your team can act on immediately.

Recorded Review Session

A live walkthrough of every finding with time to ask questions, understand the risk context, and agree on the remediation roadmap or next engagement.

What We Need to Audit Your Security

Our audit is fully read-only and non-disruptive. Here is everything you need to know before we begin.

Global Reader & Security Reader Roles

We require Global Reader and Security Reader access to review identity, device, email, and data protection configurations. Both are read-only roles — no changes can be made.

Discovery Call

A 30-minute call to understand your tenant size, compliance requirements, known security concerns, and which focus areas are highest priority for your organisation.

No Downtime Required

The audit runs entirely in the background using Microsoft's own admin portals and APIs. There is no impact on users, services, or business operations at any point.

Report Delivered Within 24 Hours

Once audit access is provided, your full Security & Compliance report is delivered within 24 hours of the audit completing, followed by a live walkthrough session.

We only request read-only, time-bound access. We never store credentials, never make configuration changes, and never retain access beyond the agreed audit window.

Security Areas Covered in the Audit

Intune & Devices — Enrollment, compliance, app protection
Conditional Access — MFA, location, device policies
Anti-Spam & Phishing — Defender, safe links, DMARC/DKIM
Data Loss Prevention — DLP policies, sensitivity labels
Identity & Entra ID — Privileged roles, guest accounts, PIM

Your Security & Compliance Report

Every audit concludes with a complete set of documented deliverables — ready to share with your leadership team, IT department, or compliance officer.

Executive Summary

A one-page risk overview covering your overall security posture, top critical findings, and the three most important actions to take immediately.

Detailed Findings Report

A comprehensive report covering all audited areas — Intune, Conditional Access, Anti-Spam, DLP, and Identity — with findings rated by severity and compliance framework mapping.

Prioritized Remediation Plan

A step-by-step action plan organizing findings by risk severity and remediation effort, with specific guidance for closing each gap found in your environment.

Recorded Review Session

A live walkthrough of every finding with your team. We explain each issue, answer questions in real time, and agree on a practical remediation plan before we close out.

What We Need to Get Started

The audit is non-intrusive, read-only, and requires minimal preparation from your team. Here is exactly what we need before we begin.

Global Reader & Security Reader Roles

We require Global Reader and Security Reader access — both read-only roles that allow us to review all security configurations without making any changes to your environment.

30-Minute Discovery Call

A brief scoping call before the audit to confirm scope, understand your license tier, and identify any known security concerns or compliance requirements your team is focused on.

Zero Disruption to Users

The entire audit is performed remotely in the background. No downtime, no maintenance windows, and no impact on your users or services throughout the engagement.

Report Within 24 Hours of Completion

Once the audit phase is complete, you receive your full security report within 24 hours, followed by a recorded review session at a time that works for your team.

We only use read-only, time-limited access throughout the audit. We never store credentials, never make configuration changes, and never retain access beyond the engagement window.

Security Areas Covered in the Audit

Intune & Devices — Compliance, Enrollment, Endpoint DLP
Conditional Access — Policy Coverage, MFA, Risk Policies
Email Security — SPF/DKIM/DMARC, Anti-Phishing, Safe Links
DLP — Policies, Sensitivity Labels, Compliance Reporting
Identity & Entra ID — Roles, MFA, App Registrations, Hygiene

Our 4 Step Process

A thorough, expert led assessment from secure access to actionable remediation plan.

  1. Secure Access

    We connect to your tenant with read only security permissions to safely collect configuration data.

    Day 1
  2. Deep Security Scan

    Our team audits every policy, configuration, and setting across your selected focus areas.

    Day 1 to 3
  3. Risk Report

    We deliver a prioritized report with severity ratings, risk scores, and step by step remediation guidance.

    Day 3 to 4
  4. Review & Remediate

    We walk you through every finding and can implement the fixes directly as part of a follow up engagement.

    Day 4 to 5

0

Clients Served

0

Satisfaction Rate

0

Average Turnaround

0

Languages Supported

Security Is Not a One Time Fix.
It Is an Ongoing Commitment.

A security check reveals the gaps. A managed support retainer makes sure they stay closed. Get continuous monitoring, monthly Secure Score reports, and a dedicated team hardening your environment every month.

  • Continuous security monitoring and hardening
  • Monthly Secure Score and health check reports
  • Rapid phishing and incident response
  • Priority response within 4 to 24 hours
  • Full M365 coverage beyond just security
  • 30 day satisfaction guarantee

Your Security & Compliance Health Check is included free with any Priority or Partner retainer plan.

Common Questions

Everything you need to know about the Security & Compliance Health Check before you book.

We require Global Reader access and Security Reader access to your Microsoft 365 tenant. These are read-only roles that allow us to review identity, device, email, and data protection configurations without making any changes. Access is time-bound to the audit engagement.
The audit takes 1 to 5 business days depending on scope. A focused single-area review takes 1 to 2 days. A full security audit across all five areas takes 3 to 5 days. A full findings report is delivered within 24 hours of audit completion.
The report includes an Executive Summary with risk scores, a Detailed Findings Report covering all audited areas, a Prioritized Remediation Plan with severity ratings, and a Recorded Review Session where we walk through every finding and answer questions.
You can choose any combination of the five focus areas: Intune and Devices, Conditional Access, Anti-Spam and Phishing, Data Loss Prevention, and Identity and Entra ID. Many clients start with their highest-risk area and expand to a full audit in a second engagement.
No. The entire audit is read-only using Microsoft admin portals, PowerShell, and the Graph API. No policies are modified, no users are affected, and there is zero impact on day-to-day operations.
Pricing depends on the number of focus areas selected and the size of your tenant. The full security audit is included at no additional cost with any Priority or Partner retainer plan. Contact us or book a discovery call for a tailored quote.
Yes. Following the audit, we offer a dedicated remediation engagement to implement fixes and harden your configuration. Many clients choose to continue with a managed retainer for ongoing monthly security hardening and monitoring.
The Security & Compliance Health Check maps findings to HIPAA, PCI-DSS, GDPR, NIS2, and SOC 2 frameworks. The report explicitly identifies which findings are compliance-relevant and which controls are present or missing for each standard.