You are on page 1of 2

Office 365: Security

Optimization Assessment
Assessment
Service Type orProgram
Description

Duration: 4 Days | Focus Area: Security and Compliance

The Office 365: Security Optimization Assessment is The assessment reviews your configuration (both internal
designed to assist your organization in understanding to Office 365 and some external factors), and your
some of the security considerations when deploying and business processes, in order to provide you with current
using Office 365. The engagement focuses on the three recommendations to enhance your security posture.
cybersecurity functions: Protect, Detect, and Respond.

OUTCOMES
The Office 365: Security Optimization Assessment provides you with a detailed findings report and plan of action to
improve your security posture based on recommended practices and expert knowledge.

01
COMPREHENSIVE

Gain a deeper understanding of


how your organization protects,
02
EXPERT RESULTS

Your environment is assessed by a


Microsoft engineer against over 100
03
GUIDANCE

A detailed findings report and two


days of knowledge transfer give
detects, and responds to security security controls. your staff the knowledge required
threats impacting Office 365. to remediate findings.
CAPABILITIES

Gain valuable insight into the security of your Office 365 deployment by proactively highlighting risks and
vulnerabilities, reviewing your results, and delivering training to provide guidance and knowledge to improve your
organization's Office 365 security posture.

ALWAYS
REPEATABLE PROVEN RESULTS
CURRENT
We can compare your results against Updated regularly with current 2000+ environments have been
previous assessments, helping you to recommendations in order to keep assessed using this toolset, with a
demonstrate improvement and on top of security trends. 95% customer satisfaction rate.
highlight new risks.

2020 © Microsoft Corporation. All rights reserved.


This data sheet is for informational purposes only.
MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY
Agenda

Phase One Phase Two Phase Three Phase Four

Pre-engagement Execute assessment Knowledge transfer Closeout

• Scoping call to run • Assess the • Two days of interactive • Management-level


through the configuration of your on-site Microsoft closeout presentation
prerequisites of the Office 365 tenant and engineer-led training of the business risk
engagement and supporting on Office 365 security represented by the
engagement structure infrastructure controls, findings
contextualized to your
• Perform an operational environment. • Report detailing all the
survey to capture findings and
process components • Arm your organization remediation steps
and understand and staff with the
external controls knowledge to
remediate any findings

TARGET
AUDIENCE

Security
C-Level SecOps Architects
Articulate the business risk Assist with detection and Plan for the future based on
response planning recommendations

ADDITIONAL
DETAILS

The Office 365: Security Optimization Assessment engagement has over 100 security controls to help you understand
how attackers will attempt to gain access and gain a foothold in an Office 365 tenant. Areas covered include:

o Exchange Online and EOP/ATP o SharePoint Online and OneDrive for Business
o Guest access o Microsoft Teams and Skype for Business Online
o Incident-response processes o Auditing and reporting
o Azure Active Directory o Device management

NEXT STEPS: If you are interested in the Office 365: Security Optimization Assessment for your
organization, contact your Microsoft account representative.

2020 © Microsoft Corporation. All rights reserved.


This data sheet is for informational purposes only.
MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY

You might also like