A Real Audit Of Your Microsoft 365 Tenant Not A Glorified Secure Score Screenshot
Most Microsoft 365 tenants, even ones running in mature organizations, have quiet misconfigurations that attackers find before you do. Petronella Technology Group runs a structured, evidence backed Microsoft 365 security audit that reviews identity, access, email hygiene, data governance, device posture, and shadow IT. You walk away with a prioritized remediation roadmap, a documented baseline for compliance work, and a defensible picture of your tenant's posture.
Why Is Microsoft 365 The Number One Breach Entry Point For Small And Mid Sized Organizations?
If you use Microsoft 365, it is almost certainly the most attacker targeted surface in your entire environment. Here is why, and what a real audit actually checks.
Microsoft 365 handles more business email and document workflow than any other platform, which concentrates attacker attention. Most business email compromise incidents we respond to begin with a Microsoft 365 authentication event: a phishing link that harvests a session token, an MFA fatigue push that got accepted, or credential stuffing against an account without strong authentication. A real audit surfaces the dozens of small misconfigurations that make any of those attacks viable.
Microsoft 365 handles more business email and document workflow than any other platform. That concentration is a gift to defenders and a target to attackers. Ninety plus percent of the business email compromise incidents we respond to begin with a Microsoft 365 authentication event, usually a phishing attack that harvests a session token, an MFA fatigue attempt, or a credential stuffing hit on an account with weak authentication. The attacker lands inside a mailbox, sets up an inbox rule that hides vendor correspondence, sends a few carefully timed invoice change emails, and walks away with hundreds of thousands of dollars.
What most organizations think of as Microsoft 365 security is a shallow veneer. Multi factor authentication turned on for most users. A conditional access rule or two. A default anti phishing policy. A Secure Score somewhere in the middling sixties, reviewed once when the tenant was set up and never again. That is not a security posture. That is a starting point.
A real Microsoft 365 security audit looks at how identity, access, data, email, collaboration, and device controls actually work together. It surfaces the exception users who were added to an MFA bypass group in 2021 and forgotten. The SharePoint site sharing data externally with a defunct contractor's Gmail address. The OAuth app that was approved for a pilot two years ago and still has mailbox read access. The guest users who have never signed in and have tenant wide privileges. The legacy authentication protocols still enabled for one line of business application. These are the findings that matter, and they are not visible in Secure Score.
What Does A Real Microsoft 365 Security Audit Actually Cover?
Eleven distinct audit domains. Not every engagement covers every domain at equal depth. Scope is tailored to your tenant and compliance needs.
Eleven domains: Identity and authentication, Entra ID posture, Exchange Online, SharePoint and OneDrive, Teams, the Defender suite, Purview, Intune and device posture, logging and retention, third-party integrations, and compliance mapping. Secure Score is a score, not an audit. A real audit produces evidence and a prioritized remediation roadmap.
Identity And Authentication
MFA coverage and method strength, conditional access policy review, sign in risk and user risk review, privileged identity management, break glass accounts, legacy authentication, and authentication methods policy.
Entra ID Posture
Directory role assignments, privileged access workflows, guest and external user configuration, group based access, application registrations, enterprise applications and their consented permissions, and dynamic group health.
Exchange Online
Anti phishing, anti spam, and anti malware policies. Safe links, safe attachments, and zero hour auto purge. Mailbox audit logging, transport rules, forwarding rules, DMARC/SPF/DKIM alignment, and mail flow analysis for data exfiltration paths.
SharePoint And OneDrive
External sharing defaults, anonymous link lifetime, sensitivity label coverage, data loss prevention policy efficacy, unused shared files and their sharing scopes, and SharePoint site permissions drift.
Teams
External access, guest policy, meeting policies, data loss prevention in chat, recording and transcription governance, and app permission policies.
Defender Suite
Defender for Office 365 tuning, Defender for Endpoint coverage and tamper protection, Defender for Cloud Apps app governance, and Defender for Identity on the on premises bridge.
Purview
Information protection labels, data loss prevention, communication compliance, insider risk management, audit log retention, and eDiscovery readiness.
Intune And Device Posture
Compliance policies, configuration profiles, app protection policies, Windows Autopilot readiness, and mobile device encryption posture.
Logging And Retention
Unified audit log enablement, log retention per license tier, SIEM integration readiness, and mailbox audit configuration.
Third Party Integrations
Every OAuth consent, every enterprise app, every guest external identity provider, and every Power Platform connector that can exfiltrate data.
Compliance Mapping
Cross reference findings against CMMC 2.0 Level 2, HIPAA Security Rule, NIST 800-171, SOC 2, PCI DSS, and state breach notification law requirements as applicable.
How Does Petronella Conduct A Microsoft 365 Security Audit From Start To Finish?
Structured, efficient, and designed to minimize disruption to your team.
Week one is read-only discovery with delegated access and scripted collection. Week two is evidence analysis and finding validation. Week three is the written report, the remediation roadmap, and the executive briefing. Most audits run two to four weeks end to end. We do not make configuration changes during the audit itself unless specifically requested.
Scoping call to understand tenant size, licensing, and compliance drivers.
Read only Global Reader or equivalent delegated access to your tenant.
Automated collection via PowerShell and Graph API against the eleven domains.
Expert manual review and correlation against compliance frameworks.
Findings session with your team, remediation roadmap, and formal report.
Most mid market audits run two to four weeks end to end. We operate with Global Reader or Security Reader permissions throughout the assessment, never with elevated rights, so your tenant is never at risk during collection. The deliverable is a written report plus live read out session, not a PDF dropped in your inbox.
What Are The Most Common Microsoft 365 Audit Findings In Organizations Just Like Yours?
Ten findings that show up in almost every mid market Microsoft 365 audit. Read this list, and the number you can honestly check off for your own tenant is probably telling.
A handful repeat in nearly every tenant: MFA bypass exception groups forgotten since initial rollout, OAuth apps consented years ago with broad mailbox permissions still attached, external sharing defaults that expose SharePoint data, inbox rules that quietly forward mail, legacy authentication still enabled for one line of business app, guest accounts with tenant-wide privileges, and unified audit log gaps.
Exception users without MFA. Executives, service accounts, or a developer who asked for an exclusion once. Attackers target these accounts first because the data on MFA enforcement is public information if you know where to look.
Legacy authentication still partially enabled. One protocol, for one workload, that should have been turned off years ago. Legacy auth bypasses conditional access and MFA by design.
Guest users with broad tenant access. External identities invited years ago and never deactivated. Some with privileges that exceed what any internal employee has.
OAuth application consent sprawl. Dozens to hundreds of third party applications that users self consented to, some of which have mailbox or SharePoint read access and are no longer used.
Auto forwarding rules that hide vendor emails. A sign of a prior or active compromise, or just poor hygiene. Either way worth investigating.
External sharing defaults set to Anyone. Including at the SharePoint site level, where the admin did not realize it was inheriting.
Audit log retention at the default. Ninety days is not enough for a real investigation. Most compliance frameworks expect one year minimum.
No Defender for Office 365 policies, or default policies with no tuning. Anti phishing thresholds wide open, safe links not applied to email, safe attachments never enabled.
No DMARC on the primary sending domain. Or DMARC at p=none with no monitoring, which is effectively no DMARC.
Global admins with standing access and no MFA hardening. Privileged identity management exists in Entra ID P2 and solves this problem, but is rarely configured.
Most tenants we audit hit six or more of these. Fixing them is not expensive. Finding them is the hard part.
What Deliverables Do You Walk Away With After The Audit Closes?
The whole point of an audit is to drive action. The deliverables are built to support that.
A written report with findings and evidence, a prioritized remediation roadmap with effort estimates, a compliance mapping to CMMC Level 2, HIPAA, NIST 800-171, or SOC 2 as applicable, an executive summary suitable for a board or cyber insurance carrier, and an optional remediation engagement. Findings are ranked by risk and effort, not by audit-industry convention.
Executive summary. A one to two page view for the board or leadership. Risk themes, overall posture rating, top recommended actions, and estimated effort. Written in English, not compliance jargon.
Detailed findings report. Every issue, categorized by severity, with evidence, a plain language description of the risk, a prioritized recommended action, and a compliance framework cross reference where applicable. This document is audit worthy for HIPAA, CMMC, and SOC 2 engagements.
Prioritized remediation roadmap. Phase one (highest impact, lowest effort) through phase three (longer term posture improvements). Includes estimated effort per item and dependencies.
Compliance mapping. For clients pursuing CMMC 2.0 Level 2, HIPAA, NIST 800-171, or SOC 2, every finding is mapped to the applicable control so the report plugs directly into the compliance program.
Optional remediation support. Clients can engage Petronella Technology Group to implement the remediation plan, or hand the roadmap to their internal team or managed service provider. We are equally happy to deliver either way.
Baseline for future audits. The evidence and posture captured at the end of an audit becomes the starting point for the next one. Organizations that run an audit annually see measurable posture improvement year over year.
Who This Audit Is Built For
Common Questions
How long does the audit take?
Most mid market engagements take two to four weeks end to end. Large or highly regulated tenants can run longer. Scoping call determines the plan.
What access do you need?
Global Reader role in Entra ID, plus any workload specific read only roles needed (Security Reader, Exchange View Only Organization Management, SharePoint Administrator in read only mode where applicable). We never ask for Global Administrator.
Will the audit disrupt our users?
No. All activity is read only. User experience is not affected during collection.
Can you help us remediate what you find?
Yes. Remediation is a separate engagement we quote alongside the audit, or clients can implement internally with the roadmap. No pressure either way.
How often should we run an audit?
Annually at minimum. Post incident, before major compliance milestones, or after significant tenant changes (merger, new SaaS integration, new regulatory regime). Ongoing managed security clients get continuous monitoring in lieu of periodic audits.
What does it cost?
Scoped per engagement. A straightforward SMB audit is a fixed fee. Large or highly complex tenants (multiple subsidiaries, multi forest Entra ID, heavy compliance lift) are scoped after the initial call. We quote before work begins.
Will this satisfy our cyber insurance or auditor?
For most insurers and many compliance auditors, yes. The findings report is formatted to support HIPAA, CMMC, NIST 800-171, and SOC 2 evidence. Let us know your specific framework upfront so we can tune the deliverable.
Where Microsoft Licensing Limits What You Can Do
Some security controls require specific license tiers. Part of the audit is flagging where a license upgrade would materially improve security and where it would not.
Microsoft 365 licensing is tiered and the security features available vary significantly. Business Basic and Business Standard offer the foundation but omit many advanced controls. Business Premium adds Conditional Access, Intune, Defender for Office 365 Plan 1, and Defender for Business, which is usually the right tier for serious small and mid market posture. Enterprise E3 adds more identity and information protection. Enterprise E5 or the Enterprise Mobility + Security E5 add on unlock Privileged Identity Management, Defender for Identity, Defender for Cloud Apps, Insider Risk Management, Communication Compliance, and advanced Entra ID identity governance.
We do not upsell licenses. We flag where a license gap is material to your risk profile and what the cost delta would be at renewal, so your procurement team can make an informed decision. Many clients find that a Business Premium upgrade from Business Standard pays for itself in reduced risk within a year. Others find that E5 features are not yet worth the cost given the current posture, and we are honest about that.
We also flag where third party tools overlap with Microsoft native controls. A standalone MDR service that duplicates Defender for Endpoint telemetry is sometimes worth keeping, sometimes worth retiring. That is a judgment call that depends on your team's appetite for in house versus outsourced operations.
Ongoing Microsoft 365 Managed Security
A point in time audit tells you where you stand today. Ongoing managed security keeps you there as Microsoft and attackers both keep evolving.
Microsoft ships new security features, deprecates old behaviors, and updates defaults at a faster cadence than most internal IT teams can track. Every quarter there is a new authentication method, a new conditional access capability, a deprecated protocol, or a change in default behavior that shifts posture either up or down. Organizations that set up their tenant once and never revisit it drift toward insecurity as new features go unadopted and old settings no longer reflect best practice.
Our ongoing Microsoft 365 managed security service covers monthly posture delta reviews, proactive application of new features that align with your compliance framework, quarterly tabletop exercises on realistic incident scenarios, continuous Conditional Access tuning as user travel and work patterns evolve, and integration of your tenant telemetry into our managed detection and response service for twenty four seven monitoring. Most clients who start with an audit convert to ongoing managed security within a quarter or two, once they see the pace of change.
Smaller organizations that do not want a full managed relationship can subscribe to a quarterly check in model, where the audit is refreshed every three to six months and a shorter session walks through new findings. This is a middle ground between one off audits and fully managed operations, and it fits a lot of small defense contractors and medical practices well.
For clients who are running their own security operations and just want a neutral outside view, we also offer a light touch annual audit plus an on call arrangement where our team is available as a sounding board for architecture decisions without ongoing monthly fees. Flexibility is the point. We shape the engagement to what your organization actually needs.
Why Petronella Runs Microsoft 365 Audits Well
A quick credibility note. There are a lot of firms offering Microsoft 365 assessments right now. Here is what makes ours different.
Our team has run Microsoft 365 incident response cases regularly since 2018, which means we know what failed configurations actually look like when they are exploited, not just what Microsoft documents say they should look like. That translates directly into better audit findings.
We hold CMMC Registered Practitioner credentials across the team and are registered as CMMC-AB RPO #1449. For defense contractor clients, the audit can double as the control evidence base for CMMC 2.0 Level 2 readiness.
Our engagements are done by the same senior team members who do our compliance and incident response work. Junior analysts do not run these audits. You get the benefit of two decades of field experience on each engagement.
We use both Microsoft native tooling (Microsoft Graph, PowerShell modules, Security and Compliance Center exports, Entra ID governance queries) and our own in house analysis scripts built from case experience. The combination catches issues that automated tools alone miss.
We deliver the findings in an honest, actionable format. No pages of boilerplate. No padded low severity items. No false sense of urgency. Just the things we found, how risky they are, and what to do about them in order.
The Risk Of Skipping The Audit
A short math exercise on why periodic Microsoft 365 audits are one of the higher return security investments you can make.
A single business email compromise incident at a mid market organization, including lost funds, incident response fees, carrier deductible, customer notification costs, and time spent by your leadership team, routinely lands in the hundreds of thousands of dollars of total impact. Several of the incidents Petronella Technology Group has responded to have crossed seven figures. The controls that would have prevented most of those incidents are free (forwarding rule alerting, conditional access to block legacy auth, MFA on every account) or cheap (a license tier that enables Privileged Identity Management).
A Microsoft 365 audit that costs a few thousand dollars and surfaces ten to twenty fixable issues that would have enabled or amplified an incident is extraordinary leverage. We have not yet run an audit where we found nothing material. The question is not whether you have issues. The question is how quickly you find them relative to how quickly an attacker does.
Cyber insurance carriers are increasingly pricing this into their underwriting. Renewals that include a recent third party Microsoft 365 security audit with a documented remediation plan now draw better pricing in many markets. The audit pays itself back through premium improvement in a single renewal cycle for many mid market clients.
For defense contractors pursuing CMMC, the audit is not optional. The CMMC 2.0 Level 2 assessment process inspects the exact surface the audit covers. Organizations that have not run an independent audit tend to fail their pre assessment and then scramble in a compressed timeline. Organizations that have run an audit six to twelve months in advance usually pass on the first attempt. The delta is measured in weeks of leadership time and tens of thousands of dollars of assessor fees.
Getting The Most Out Of Your Microsoft 365 Audit
A few simple actions before the audit starts that will make the findings more useful and the engagement faster.
Pull your current license inventory. Know what you are paying for and who has what license assigned. Many audits turn up users with expensive licenses they do not use, and users doing privileged work on inadequate licenses. A current license map is a fifteen minute task that pays dividends.
List your compliance frameworks and key contractual obligations. CMMC, HIPAA, SOC 2, PCI DSS, DFARS, state breach law. Also any customer facing SOC 2 commitments, DPA terms, or business associate agreements. Compliance mapping is only useful if we know what you have committed to.
Identify your power users and service accounts. The audit is far more useful when we know which mailboxes handle customer payments, which accounts run integrations and automation, and which users have administrative privileges. A quick org chart and a list of service account owners is ideal.
Share recent incident context if any. If you had a phishing event, a suspicious login, a failed login spike, or a past compromise, tell us. That history shapes where we dig. Audits that start with a list of "things that made us nervous last year" often land higher impact findings.
Assign an internal point of contact. Someone who can answer questions about business workflows, integrations, and prior security decisions. Usually a senior IT person or a CISO equivalent. Does not need to be full time on the engagement, but needs to be reachable.
None of these are hard requirements. We can run an audit without them. But the findings are more targeted and the remediation roadmap more useful when we start with this context.
Find Out What Your Tenant Actually Looks Like
Secure Score is marketing. A real Microsoft 365 security audit shows you the misconfigurations, the legacy protocols, the forgotten exceptions, and the compliance gaps. Call Petronella Technology Group at (919) 348-4912.