Most M365 tenants are misconfigured. Is yours?
Microsoft 365 is the backbone of most NZ businesses — email, Teams, SharePoint, OneDrive. It's also the most common entry point for phishing, ransomware, and business email compromise. A KIS M365 assessment reviews your entire tenant configuration against Microsoft security best practices and NIST CSF 2.0 Protect controls, giving you a clear remediation plan. Most businesses are surprised by what we find.
What's included- Full Microsoft Secure Score review benchmarked against NIST CSF 2.0
- Exchange Online and email security configuration (SPF, DKIM, DMARC)
- MFA coverage review and gap identification
- Conditional access policy review
- SharePoint and OneDrive sharing settings audit
- Teams security configuration and external access controls
- Admin privilege and service account review
- Plain-English report with prioritised remediation steps
MFA not enforced for all users — especially admins and finance staff
No DMARC record — attackers can spoof your domain in phishing emails
SharePoint sharing set to "Anyone" — files accessible without login
Excessive global admins — more full-control accounts than necessary
Audit logging disabled — no record of who accessed what, when
Legacy authentication enabled — bypasses modern MFA policies
These appear in the majority of M365 tenants we assess — based on KIS M365 assessment data. Each is fixable, usually within hours.
