Ireland, UK & EU · Remote delivery
Microsoft 365 Security
for Small Business
Three focused services to assess, recover, and secure Microsoft 365 tenants.
What's included
- Review tenant security configuration and common gaps
- Check for signs of compromise or risky access
- Review mailbox rules, forwarding, and permissions
- Validate authentication and access controls
- Review email authentication setup including SPF, DKIM, and DMARC
- Provide a clear summary of findings and recommended next steps
How it works
- Remote review of your current Microsoft 365 setup
- Global Reader access is usually enough to begin
- Where possible, small issues can be addressed during the session
- Larger changes are provided as clear implementation steps
- No agents or software to install
Good for
Companies that want to understand what needs attention before something goes wrong.
If you move ahead with hardening afterwards, pricing is reduced accordingly based on the work already completed.
What's included
- Contain active threats and stop malicious activity
- Investigate sign-ins, audit logs, and attack methods
- Identify persistence such as mailbox rules, forwarding, and OAuth apps
- Secure affected accounts where permissions allow
- Provide a clear explanation of what happened and what to do next
How it works
- Contact via email or form
- Containment is prioritised first
- Temporary admin access may be needed depending on the issue
- Investigation and cleanup follow once the account is stabilised
- Summary and next steps are delivered clearly
Good for
Active or recent Microsoft 365 compromise, including mailbox sending spam, suspicious sign-ins, or phishing sent internally.
Same-day response for active compromises.
What's included
- Apply authentication and access controls
- Harden Exchange Online and mailbox protections
- Review and tighten admin roles and permissions
- Improve logging and visibility for future incidents
- Align tenant with Microsoft security best practices
How it works
- Built around the gaps identified during a review or after an incident
- Appropriate controls are applied based on tenant size, setup, and licensing
- Changes are agreed before implementation begins
- Work is carried out remotely where access is available
- If you already completed a review, only the required changes are implemented
Good for
Companies that want the tenant properly secured after a review, after an incident, or as a proactive next step.
Pricing depends on tenant size and complexity. Smaller tenants typically fall within the starting price range, while larger environments require additional scope.