Overview
Mid‑size client (~180 mailboxes) with repeated phishing incidents and shadow IT apps. Objective: stabilize risk fast without disrupting operations.
Last updated: 2025-11-06
Mid‑size client (~180 mailboxes) with repeated phishing incidents and shadow IT apps. Objective: stabilize risk fast without disrupting operations.
No downtime allowed, limited MFA adoption history, multiple legacy mailflow rules, and third‑party add‑ins in Outlook.
Enforced MFA for admins & high‑risk users, enabled number‑matching, blocked legacy auth, hardened conditional access.
Defender presets, safe links/attachments, disabled auto‑forwarding, refined spoofing policies, and mailbox rules audit.
Baseline Secure Score actions, admin role scoping, alert tuning, and removal of risky OAuth grants.
Phishing‑labeled messages reaching inbox decreased 80% over 30 days, same seasonality.
Blocked macro‑based payloads via policy and detonation (0 to date).
Score uplift in two weeks, with tracked evidence for audit.
Microsoft 365, Entra ID, Defender for Office 365. Evidence bundle: before/after settings, policy exports, and incident metrics (redacted).
Start with a free readiness check. We’ll tell you what to fix this week.