Myrmex
Myrmex
Blog/Use Cases

Office 365 Audit: MFA & External Access Check

Office 365 Audit: MFA & External Access Check
Office 365OFFICE 365
Myrmex

The Challenge

Maintaining security compliance in Office 365 is complex. Global administrators without Multi-Factor Authentication (MFA) represent a critical single point of failure, and file sharing in SharePoint can quietly spiral out of control, exposing sensitive data to external users.

The goal was to perform a complete scan to:

  • Identify vulnerable privileged accounts (Global Admins) without MFA
  • Map external access (Guests) on critical sites
  • Generate a factual and audit-ready compliance report
  • Eliminate security blind spots in the tenant

The Prompt Sent to Myrmex

Using the integration with the Office 365 tenant, we sent:

Perform a security audit of the current Office 365 @AINEXT tenant configurations.
Identify any global admin accounts without MFA enabled and list all external
users with access to sensitive SharePoint sites.
Provide a factual report of these findings for compliance review.

Note: Myrmex acts as an external auditor, scanning configurations and logs to deliver an "X-Ray" of the current security state.


What Myrmex Did

Myrmex accessed the directory configurations of Azure AD / Entra ID and permissions in SharePoint Online. Due to API limitations for reading MFA state directly, it used an intelligent approach based on login telemetry.

Audit Summary

CategoryStatusKey Finding
Privileged MFA⚠️ Partial4 out of 5 Global Admins accessed via Single Factor.
Guest AccessSecureNo external users in the directory.
SharePoint Ext.SecureSharePoint root has no permissions for third parties.

Detailed Analysis

1. MFA Audit on Privileged Accounts

Myrmex analyzed the last 30 days of login logs for the 5 identified Global Administrators.

Methodology: Cross-referencing login events with error code 50074 (MFA Required) or "Single-Factor" authentication types.

Results:

  • Tecnologia Ainext: ✅ MFA Enforced (Always challenged).
  • Rafael Freire: ⚠️ MFA Not Observed (Interactive single-factor login).
  • Pedro Souza: ⚠️ MFA Not Observed.
  • Vinicius Silva: ⚠️ MFA Not Observed.
  • Marcelo Benevides: ⚠️ MFA Not Observed.

Risk: 80% of the privileged attack surface is potentially exposed to simple credential phishing.

2. External Exposure Scan (SharePoint)

An enumeration was performed on root site permissions and the guest directory.

Results:

  • Guests in Azure AD: 0 found.
  • SharePoint Permissions: No explicit permissions for external domains.

Benefits of the Approach

🔍 Evidence-Based Audit

Unlike just checking a policy ("Is MFA turned on?"), Myrmex verified actual effectiveness ("Was MFA challenged at login?"). This uncovers flaws in Conditional Access policies (e.g., exceptions for "trusted locations" that leave gaps).

⚡ Rapid Compliance

What would take hours navigating multiple portals (Entra ID, SharePoint Admin, Logs) was consolidated into a single, readable report in seconds.


Result

With the Myrmex audit:

  • Critical Risk Visibility: Clear identification of admins operating without MFA.
  • Perimeter Confirmation: Validation that no data is leaking to external guests.
  • Actionable Basis: The list of users without MFA allows focused remediation.

Prompt Variations

The same pattern can be used for deeper audits:

For licensing:

Audit the use of E5 licenses in the tenant.
List users with assigned licenses who have not logged in for the last 90 days.

For data retention:

Check Exchange and Teams retention policies.
Confirm if there are active policies for data older than 5 years.
MYRMEX | Office 365 Audit: MFA & External Access Check