Skip to content

IT services

Microsoft 365 security clean-up for teams with tenant drift

Entra ID, Conditional Access, Intune, Defender, Exchange and SharePoint brought into controls your team can actually run - not just pass an audit.

What tenant drift looks like

Stale admin roles, MFA exceptions nobody remembers approving, external sharing left wide open, Defender features turned off, Intune policies that half-apply, legacy authentication still enabled, shared mailboxes with no clear owner and security alerts that go unread.

Defender endpoint clean-upIntune & Autopilot fixes

What's included

Entra ID users, groups, roles and privileged access review, Conditional Access and MFA controls audit, Intune compliance and device enrolment check, Defender and Office configuration review, Exchange Online mail security posture, SharePoint and OneDrive external sharing clean-up, admin accounts, break-glass access and audit visibility, and a practical runbook for ongoing maintenance.

Entra ID & Conditional AccessCyber Essentials Plus readiness service

What you get

A prioritised remediation plan, implemented fixes where approved, clear evidence of what changed, and a handover document your internal IT team can actually use going forward.

How cleanup is sequenced

The work starts with the controls most likely to expose the business: privileged access, MFA gaps, legacy protocols, external sharing, unmanaged endpoints and alert ownership. Lower-risk housekeeping follows once the urgent control decisions are visible, agreed and assigned to the right owner.

What to prepare first

Useful starting material includes tenant size, admin-role list, current MFA and Conditional Access approach, Defender licensing, endpoint management state, external sharing concerns, audit pressure and any controls the team already knows are awkward to operate.

What good looks like after cleanup

A cleaned-up tenant has fewer unexplained exceptions, named owners for recurring checks, a documented access model, clearer sharing boundaries and evidence that can be reused for audit, board reporting or supplier review. The handover notes record what was changed and why, so internal IT can maintain the posture without starting from scratch.

Common questions

Is this a managed IT service?

No. This is focused Microsoft 365 security review, remediation and handover. It can sit alongside an MSP or internal IT team, but it is not ongoing helpdesk support.

Do you need global admin access?

Not by default. Access is scoped to the work. Where elevated permissions are required, they should be time-bound, approved and logged.

Can you work alongside our existing MSP?

Yes. This kind of work runs well alongside an MSP or internal IT team, provided responsibilities and access are clearly defined.