Back to services

Security Assessment

Start here with lowering your security posture and get an understanding of your weaknesses..

Start today

Nedscaper is your platform for Managed Extended Detect and Respond Services.

The Nedscaper security assessment will scan and analyze settings and configuration inherent to your security baseline in Microsoft 365.

Prevention is better than cure

  • Quick insight into the security posture of your current landscape
  • Complete overview of classified risks and mitigations.
  • Performed by Microsoft Certified Security consultants.
  • Concrete follow-up plan for immediate use (independent or with our Consultants).

What does it mean?

The following assets are in scope of the assessment:

  • Identity (Azure AD and Active Directory) via Microsoft Defender for Identity and Azure Identity Protection
  • Devices (Windows 10) via Microsoft Defender for Endpoint
  • Apps (Office 365; Exchange Online) via Microsoft Defender for Office 365
  • Data (GDPR; data classification) via Microsoft Defender for Cloud Apps Security

The first day is on-site or remote scan of the environment and questionnaire. The second day is writing the extensive report (~40 pages) and the last day is presenting the report and discuss the next steps. The next steps can be taken with the recommendation from the report abut also (most customers prefer this option) is to remediate the recommendations with one of our security consultants.

Why Nedscaper?

  • Performed by certified Security professionals (CISSP/CCSP, CEH/OSCP and MS-/AZ-500)
  • Ahead of Microsoft technology (member of the Microsoft Private Preview program and Microsoft Security Design partner)

Benefits of a Security Assessment 

  1. Scan of your technical Microsoft 365 infrastructure with a security vision, identity on-premises and in the cloud (Active Directory & Azure AD), devices, apps, and data.
  2. We process the information into concrete handles in an extensive technical report.
  3. Provide insight into vulnerabilities that can be abused by malicious parties.
  4. Detect configurations not conform Microsoft recommended practices by running a check on your modern workplace.
  5. Process information in a functional report in which we translate business demands and security policies into the required and optional solutions.

Ready for 24x7 eyes on screen?
Let's get started!