Information Technology Firm

Adopting M365 for Remote Working

Project Detail

The client, like many organisations, swiftly adopted Microsoft 365 to meet the demands of remote working. They sought an expert to conduct a thorough review and remediation of their IT estate, revamp their existing technologies, and implement digital-friendly solutions to enhance their core business operations. Despite having a small team with strong technical skills, they lacked in-house security expertise.

For organisations shifting rapidly to remote working, the challenge isn’t just technology adoption — it’s maintaining secure and resilient operations across new networks, devices, and access patterns. Unsecured remote access can expose data, erode customer trust, and increase regulatory risk — particularly when governance and visibility are limited.

Challenge

The client faced two primary challenges. Firstly, they were uncertain about their current security posture and their exposure to modern-day threats. Secondly, they were unsure about the best steps to address any existing issues and develop a roadmap to achieve their future strategic goals.

While the environment appeared functionally operational, visibility into security controls, authentication patterns, and compliance evidence was unclear — creating a gap between perceived readiness and actual security posture.

Solution

Rather than relying solely on automated scans or configuration flags, Metis Security integrated manual validation and workflow testing to understand how the environment behaved under real user patterns and potential threat scenarios.

We were engaged to perform a comprehensive Microsoft 365 security assessment, which comprised of two key phases:

  • A technical assessment of fundamental security controls within the Microsoft 365 environment, including authentication and multi-factor authentication, user and group configurations, data classification and privacy controls, external sharing, and reporting configurations.
  • A governance and risk management assessment, which extended the technical assessment to evaluate the security operating model, change control processes, business continuity and recovery (BCR) plans, joiners / movers / leavers (JML) process, and licensing requirements.

Key components reviewed included Azure Active Directory, Exchange, OneDrive, Teams, SharePoint and OneDrive.

Outcome

The client leveraged the assessment findings and our continuous support to develop a tailored roadmap aligned with their risk appetite and future strategic direction. The assessment not only addressed specific security issues, but also emphasised cloud-native changes in their underlying business-as-usual (BAU) activities. This approach ensured that the client’s security measures remained effective over time, adapting to the evolving threat landscape and enabling them to navigate their digital transformation journey with confidence.

These enhancements not only improved the technical controls but also increased confidence for leadership by providing demonstrable evidence of security posture — enabling both operational continuity and better alignment with compliance expectations.

Conclusion

Our comprehensive Microsoft 365 Security Assessment provided our client, an information technology services organisation, with valuable insights and guidance to strengthen their security posture and support their digital transformation. By addressing their security challenges and developing a roadmap aligned with their strategic objectives, we empowered them to navigate the evolving threat landscape with confidence. With our continuous support, the client can implement cloud-native changes and enhance their business-as-usual activities, ensuring long-term effectiveness in protecting their cloud environment.

This engagement illustrates that adopting collaboration technology without intentional, evidence-based security evaluation can leave organisations exposed — and that aligning security with real-world usage builds both resilience and confidence.

 

Want a Microsoft 365 Security Makeover?

Take the next step to securing your organisation