Skip to content

Fixed-scope offer

Cyber Essentials Plus Readiness Sprint

Short readiness sprint to expose the Microsoft 365, endpoint, patching and evidence gaps most likely to derail assessment.

This is a scoped Microsoft 365 security engagement for teams that need a clear answer, not another open-ended support queue. The work starts with the control area in front of you, then turns findings into an ordered plan your team can approve, implement and maintain.

How it runs

Practical review, written decision trail, handover.

The work starts by confirming tenant size, current suppliers, licensing, deadlines and the control owner. Access is kept to the agreed scope, elevated permissions are time-bound, and changes are only made when the route is understood.

Findings are grouped by operational risk, not by portal menu. That means identity, endpoint, mail, collaboration and evidence gaps are turned into a sequence your team can approve, track and keep running after the engagement.

Best for

  • Teams with a booked or planned Cyber Essentials Plus assessment.
  • SMEs that failed a previous control check or assessor dry run.
  • Organisations that need collection points and remediation ownership clear before audit pressure lands.

Commercial details

Commercial model
Two-to-three-week sprint with fee agreed before work starts.
Typical timeframe
Usually 2 to 3 weeks depending on access, device scope and change approval.

Signs this is the right fit

Use these signals before booking. They keep the conversation focused on risk, ownership and the output your team actually needs.

  • An assessment date is close and device, MFA or patching evidence is still unclear.
  • Previous checks raised findings but the remediation order is not agreed.
  • Internal IT needs assessor-facing evidence without losing time to broad tenant cleanup.

The handover gives internal owners a readiness register, evidence list, remediation notes and assessor discussion points for the controls still in motion.

The first week should identify what could fail sampling: unmanaged devices, missing patch proof, weak MFA evidence, unclear malware protection and unsupported systems. Remediation then follows assessment risk, not whichever setting is easiest to click, so effort stays aligned with assessor pressure.

Included

  • Readiness gap review across MFA, endpoint, patching and evidence.
  • Microsoft 365, Entra ID, Intune and Defender control review.
  • Remediation sequencing for controls most likely to affect outcome.
  • Evidence pack structure with named collection points.
  • Assessor-facing remediation log where useful.

Outputs

  • Readiness risk register.
  • Assessor-ready evidence list.
  • Remediation tracker.
  • Handover notes for internal IT and assessor discussion.

Not included

  • Certification or assessment.
  • Guarantee of pass outcome.
  • Commodity endpoint support outside the agreed readiness scope.

Useful before you book

M365 score tool

Quick self-check across identity, endpoint, governance, and monitoring.