Identity & Security Assessment

Understand Your Actual Risk, Not Just Assumptions

Many organizations assume they are secure simply because no incidents have occurred. In reality, identity and access misconfigurations often remain undetected for months or even years.
At Accelerate IT Services, our assessments are based on real attack paths, hands-on labs, and production experience, rather than checklists.

What This Assessment Is (and Is Not)

This assessment is not a generic scan or a compliance checkbox. Instead, it is a practical, engineering-led review of how your identity and security controls perform in real-world scenarios.

How attackers bypass existing controls pass controls

  • Where Conditional Access assumptions fail
  •  Which alerts are ignored or misconfigured
  • How lateral movement could occur if an account is compromised

What We Assess

Identity & Access

1. Microsoft Entra ID configuration
2. MFA enforcement gaps
3. Legacy authentication exposure
4. Conditional Access scope and exclusions
5. Guest and external user access paths

Conditional Access Reality Check

1. "All Users" and related exclusion risks
2. Device trust assumptions
3. Misalignment between sign-in risk and user risk
4. Emergency access (break-glass) failures

Device & Session Risk

1. Device compliance enforcement
2. Token & session lifetime exposure
3. Differences between browser and managed device behavior.
4. Session persistence risks

Detection & Response

1. Identity Protection alert coverage
2. Signals that are enabled but have gaps between alerting and response actions.
3. Admin visibility blind spots

How Our Assessment Is Different

Most MSP assessments focus on policy reviews. Our assessments are driven by attack-path analysis.

We base our findings on:

  • Daily Microsoft identity research
  • Hands-on labs and experiments (F11.ca)
  • Real-world incident patterns
  • Production tenant behavior, not documentation claims

This approach results in fewer false positives and more actionable recommendations.

What You Receive : 

After the assessment, you will receive:

Clear risk summary (executive-friendly)
Technical findings (engineer-ready)
Mapped attack paths (what fails first)
Prioritized remediation plan
Quick wins vs long-term fixes
We avoid jargon, scare tactics, and pressure to upsell.

Who This Is For

This assessment is ideal for:

  • Organizations using Microsoft 365/Entra IT Teams are uncertain whether MFA
    and Conditional Access are fully enforced.
  • Businesses with remote or hybrid workforces
  • MSPs needing a second set of expert eyes
  • Companies preparing for audits, insurance, or growth

When You Should Request an Assessment

  • You’ve “set up” Conditional Access but never tested it
  • You rely heavily on MFA and device trust.
  • You allow guest users or external sharing.
  • You have not reviewed identity security in the past 6 to 12 months.
  • Begin with visibility, not guesswork.

Our assessments are informed by ongoing research published on ITBlogs.ca and
MSPInsights.ca, as well as hands-on experiments conducted at F11.ca.