M-Tech Labs AI
Eastbourne · UK
/ AI Consultancy / Permissions & identity

Clean up the permissions AI will quietly inherit from SharePoint and Entra.

Copilot and agents take whatever access your identity and sharing model already grants. We tighten that model before an LLM puts a search API across the top of it.

01/ What's involved

Where we look, and what we change.

A focused review across identity, privileged access and sharing — the three surfaces that decide what Copilot will be allowed to read.

Activity

Entra ID posture review

MFA coverage, legacy-auth blocking, sign-in risk policies, device compliance — the controls that decide who actually gets into your tenant.
Activity

Privileged role audit

Global Admins, Exchange Admins, SharePoint Admins and service accounts with standing scope. Most tenants have three to five times more than they need.
Activity

Conditional Access baseline

Policy review against the Microsoft and NCSC baselines — identifying gaps, shadow exclusions and the "temporary" rules that never expired.
Activity

SharePoint & Teams permissions

Site-by-site permission mapping, external-sharing posture and inherited-access sprawl. The layer Copilot will read through by default.
Activity

Guest & external access

Dormant guests, B2B collaborations past their usefulness and "anyone with link" files that predate the current sharing policy.
Activity

Offboarding & account lifecycle

How leavers are deprovisioned, whether their OneDrives and mailboxes linger in the index, and what automation exists to keep it tidy.
02/ What you get

Defensible, documented, reproducible.

The same controls Assurix verifies live — privileged-access hygiene, MFA/CA posture, patch and supplier discipline — written down once so you stop rediscovering them.

  1. 01

    Identity risk register

    Every finding scored by likelihood and blast radius, with a named owner and a remediation step — the kind auditors actually like.

  2. 02

    Privileged-access plan

    PIM scope, break-glass design, standing-rights cleanup list — a pragmatic path to least privilege, not a purity exercise.

  3. 03

    Conditional Access ruleset

    Cleaned-up policy set, documented exclusions and a change log — so the next reviewer doesn't start from zero.

  4. 04

    Sharing & lifecycle runbook

    How new sites are provisioned, how sharing is defaulted, how leavers are offboarded — written so operations can run it.

03/ Typical findings

What we usually find first.

None of these are rare. All of them matter more the moment an LLM can ask "show me everything about X".

/ Backed by

Delivered by M-Tech Labs with the compliance and security discipline of M-Tech Systems — Cyber Essentials certified, aligned to NCSC CAF 4.0 and progressing through the Assurix trustmark programme.

Back to AI Consultancy
/ Start a conversation

Tighten identity before Copilot goes live.

A focused review, a prioritised fix list, and the option to stay on for the remediation sprint that actually closes the gaps.