Frequently Asked Questions

Frequently Asked Questions About Microsoft 365 Security

Have questions about how we identify and fix Microsoft 365 security risks? You'll find answers below, or reach out and we'll walk you through it.

About Our Services

  • A Microsoft 365 Security Assessment is a structured review of your Microsoft 365 tenant configuration to identify the specific settings, gaps, and misconfigurations that create risk of account takeover, business email compromise (BEC), and data exposure.

    We don't stop at identifying gaps. As part of our 30-day engagement, we implement the controls to fix them and verify they're working, so you're left with a hardened environment, not just a report.

  • The 30-day timeline covers the full engagement from kick-off to validated remediation:

    • Days 1–3: Intake call, scoping, and tenant access provisioning
    • Days 4–10: Configuration assessment across all in-scope areas
    • Days 11–14: Findings analysis and risk report preparation
    • Days 15–16: Findings review call with your team
    • Days 17–27: Guided or fully managed remediation of identified gaps
    • Days 28–30: Validation, final documentation, and handoff

    The exact timeline may vary slightly depending on the complexity of your environment and your team's availability during the remediation phase.

  • We specialize exclusively in Microsoft 365, including Exchange Online, SharePoint Online, OneDrive for Business, Microsoft Teams, Microsoft Defender for Business, and Microsoft Entra ID. This focused scope is intentional: deep specialization in a single platform delivers better results than a broad, shallow approach across many tools.

    If your organization uses other cloud platforms alongside Microsoft 365, we can advise on how those integrations affect your Microsoft 365 security posture, but we do not perform assessments of Google Workspace, AWS, or other platforms.

  • We work with small and mid-sized businesses, typically in the 10 to 500 user range. This is the segment that faces the highest fraud risk relative to their security investment, and the organizations most likely to lack a dedicated internal security function.

  • Yes. Following the initial assessment and remediation engagement, we offer ongoing Microsoft 365 security monitoring and response to help your organization maintain a strong security posture as your environment evolves, new users are onboarded, and Microsoft releases configuration changes. Contact us to discuss what a continued engagement looks like for your specific situation.

Security & Technical Questions

  • Account takeover (ATO) occurs when an attacker gains unauthorized access to a legitimate user's Microsoft 365 account, typically through phishing, credential stuffing, or password spraying. Once inside, the attacker can:

    • Read and exfiltrate sensitive emails and files
    • Impersonate the user to authorize fraudulent payments (BEC fraud)
    • Set up email forwarding rules to silently copy outbound messages
    • Use the account as a launching point to compromise other users
    • Access connected business applications (ERP, banking, HR systems)

    The FBI reports over $2.7 billion in annual losses from BEC fraud alone. For a mid-sized business, a single successful account takeover can result in six-figure losses within hours.

  • MFA is critical, but enabling it for some users isn't the same as enforcing it effectively for all users, all applications, and all access paths. Common gaps we find even in organizations that believe they have MFA covered include:

    • Legacy authentication protocols that bypass MFA entirely (IMAP, POP3, SMTP Auth)
    • MFA enabled but not enforced via Conditional Access — users can decline the prompt
    • Service accounts and admin accounts excluded from MFA policies
    • Weak MFA methods (SMS-based) still active alongside stronger methods
    • Guest accounts not covered by your MFA policies

    Our assessment ensures MFA is properly enforced across all users, applications, and access paths.

  • Conditional Access is Microsoft Entra ID's policy engine that controls when and how users can access Microsoft 365 resources. Instead of simply verifying a password and MFA code, it evaluates the context of each sign-in, including the user, device, location, and application, and makes a real-time access decision.

    This allows you to block access from high-risk locations, require compliant devices for sensitive applications, and enforce stricter controls for privileged accounts. It's included in Microsoft 365 Business Premium and is one of the highest-impact security controls in the platform.

  • Microsoft Secure Score is a useful starting point. It surfaces recommended actions and scores your tenant against a broad set of controls. However, it has important limitations:

    • It doesn't prioritize findings by actual fraud risk. A low-impact cosmetic setting can score the same as a critical authentication gap
    • It doesn't account for your specific business context, user base, or industry
    • It doesn't verify whether controls are actually effective, only whether they appear to be configured
    • It provides no implementation guidance or remediation support

    A Klevr assessment uses Secure Score as one input among many, but adds expert interpretation, business context, fraud-specific prioritization, and hands-on remediation. The result is a measurable security improvement, not just a score.

  • Done correctly, most Microsoft 365 security improvements are transparent to end users or require minimal one-time re-authentication steps. We design and stage all remediation changes to minimize disruption, and we sequence implementations to test for unexpected impacts before broad rollout.

    For changes that do require user action (such as registering for a stronger MFA method), we provide clear communication templates your IT team or helpdesk can use to prepare users in advance. In practice, the disruption from security improvements is minimal, especially compared to the impact of an account compromise.

Getting Started

  • For the assessment phase, we require read-only access to your Microsoft 365 tenant. Specifically, we use a Global Reader role (or equivalent limited permissions) that allows us to review configuration settings without the ability to make any changes. We document exactly what permissions we request and why before any access is provisioned.

    For the remediation phase (if you choose managed remediation), we request time-limited administrative access scoped to the specific tasks being performed. All changes are documented, and access is revoked upon completion of the engagement.

  • We provide fixed-price proposals based on your environment, not hourly billing. Pricing is scoped after a 30-minute security review so you have a clear, predictable cost before any work begins.

    Book your 30-minute security review

  • Many of the highest-impact security controls, including Conditional Access, Microsoft Entra ID Protection, Defender for Office 365, and Microsoft Purview audit capabilities, are included in Microsoft 365 Business Premium. If you're on a lower tier (Business Basic or Business Standard), we'll identify which security gaps are license-related versus configuration-related, and provide a clear recommendation on whether a license upgrade makes sense for your risk profile.

    We can assess and remediate any Microsoft 365 tenant regardless of plan, tailoring recommendations to the controls available in your current licensing tier.

  • Yes, this is one of the most common situations we work in. Managed service providers do an excellent job of keeping Microsoft 365 running reliably, but security hardening against fraud-specific attack vectors often falls outside their standard service scope.

    We work alongside your MSP, not around them. We share our findings directly with your MSP team, provide implementation guidance in their preferred format, and can coordinate changes through them if that's how you prefer to manage your environment. Most MSPs welcome the specialist support.

  • The first step is a 30-minute security review. On that call, we'll ask a few questions about your Microsoft 365 environment, current controls, and any concerns you have. From there, we'll determine whether the engagement is a good fit and outline the recommended scope of work.

    If it makes sense to proceed, we'll provide a fixed-price proposal, typically within 24 hours.

    There's no commitment required to take the call.

    Book your 30-minute security review

Still Have Questions?

Have a question or want to talk it through?

Start with a 30-minute security review or send us a message.

Send Us a Message Book 30-Minute Security Review
Get Started

Secure Your Microsoft 365 Environment in 30 Days

Start with a 30-minute security review. We'll identify where your environment is exposed to account takeover and fraud, and how to fix it.

Book 30-Minute Security Review

No commitment. A focused 30-minute conversation.