https://store-images.s-microsoft.com/image/apps.30333.61b78415-d596-429f-bb9a-1d99609a693b.85e9227f-f2ea-4b72-8f35-4099485fb8ee.4c85441e-358f-462f-b798-63953ea5e4a3

Proximus Microsoft 365 Security Assessment

PROXIMUS NV/SA

With the Microsoft 365 Security Assessment, Proximus gives you a comprehensive insight offering you consistent information across different security risks.

With the Microsoft 365 Security Assessment, Proximus gives you a comprehensive insight offering you consistent information across different security risks. It enables your organisation to improve its security posture. It gives your IT teams an easy-to-use roadmap that will minimize their efforts, while simultaneously improving the overall security posture.
The assessment is designed to minimize workload on the internal teams with ZERO end-user impact. The typical assessment will span a one-month period to include a full business cycle. This will generate a realistic insight in the risks the Customer faces based upon a full month of security data.


The assessment consists of 5 steps :

1. Scoping - goals are determined, stakeholders are identified and next steps and deliverables are set
2. Set-up and interviews - interviews are made with stakeholders and the tools are configured
3. Data collection
4. Reporting and preparation - data from tools are gathered and report is prepared
5. Presentation - report is presented, recommendations and priorities are discussed.


Proximus makes sure the security of the Customer’s Microsoft 365 environment is in line with the Customer’s business requirements and industry best practices. This is achieved by reviewing the security controls, configuration policies and map these to the CIS Framework for Microsoft 365 and Industry Best Practices.
The assessment will not only be based upon a static review of policies and controls: the report will also include actual security events in your environment. Proximus will use Microsoft native tools to conduct the analysis of the logs and alerts. All the information will be processed inside the Customer’s Microsoft tenant to ensure no data will leave the Customer’s environment.

At a glance

https://store-images.s-microsoft.com/image/apps.56332.61b78415-d596-429f-bb9a-1d99609a693b.4873f613-d440-4155-ba06-397bf059a14f.96e19ddf-cd55-4451-8d7d-91adf375df82
https://store-images.s-microsoft.com/image/apps.41545.61b78415-d596-429f-bb9a-1d99609a693b.ae68b5c0-562e-4eab-86f7-8b2523b7711f.dc53381c-a94f-42a3-b691-a267cc5c6598