Conscia Security Hardening; 3-6 Weeks Consulting and Implementation

Nil d.o.o.

We offer a suite of services and solutions that can help secure your applications, workstations, and servers that use Microsoft solutions (Windows, Exchange, Azure, Office 365...).

NIL, part of Conscia, can help you reach IT compliance, improve your Security Posture and help you implement Security Settings across your environment. The key advantage of our approach is that it provides you with the highest level of security with existing features, most of which are already part of Windows and existing licenses and with the implementation of Microsoft 365 security products, where required.


We help you improve the Cyberdefenses across your whole IT environment. Our methodology covers the following stages:

  • Vulnerability discovery and identification of weak points: status review using established tools and methodologies such as Microsoft Security and Compliance Toolkit, CIS Benchmarks, Tenable Nessus, PingCastle, or Cyber Security Assessment Tool (CSAT)
  • Results of the analysis (report) and list of the most critical vulnerabilities
  • Action plan to address identified vulnerabilities
  • Implementation or assistance with implementation of security hardening on any of the following areas: for identity and access management systems (Implementation of Microsoft Defender for Identity, passwordless or multi-factor authentication and Conditional Access, security hardening of on-premises AD DS infrastructure), for endpoints (Implementation of Microsoft Defender for Endpoint, Microsoft Defender Application Guard, Application whitelisting using AppLocker or Microsoft Defender Application Control, device encryption using BitLocker, local accounts security using Local Administrator Password Solution), for hybrid infrastructure (IaaS, PaaS, On-premises) with implementation of Microsoft Defender for Cloud, for applications (SaaS) with implementation of Microsoft Defender for Cloud Apps
  • Consulting on additional security improvements and IT architecture adjustments

At a glance