What we require from you is a specific description with a fair amount of details as to what exactly you do in regard to each of these products. Usually 2-3 Sentences per product as sufficient.
Hey Customer,
I hope you are well , we are submitting proof to Microsoft about the following work conducted by %MSP NAME % in your Environment for our Security Designation per list below
Can you reply to this email that %MSP NAME % has implemented all these for you?
Exchange Online
We have used Microsoft Online to host all %CUSTOMER% mailboxes into Microsofts cloud as well as Distribution groups. We used Connectors to relay emails in and out of %CUSTOMER% exchange Online Enviroment as well as setup of Security Policies.
Microsoft 365 Apps
We helped deploy the roll out of Office 365 Apps via Intune to upgrade existing Users to the latest version of Office.
Teams Phone Enabled Users
We have onboarded %CUSTOMER% into a Direct Routing Partnership with a VOIP carrier setting up Hunt Groups and Call Policies for Reception Offices.
Azure Active Directory Premium Conditional Accesss
We Deployed Conditional Access Policies to Enforce MFA \ Block Counteries outside of Certain Allow Lists and Also Block Legacy Authenticaiton
Microsoft for Defender for Cloud Apps
We have used Microsoft for Defender for Cloud Apps to report shadow IT Applications for %CUSTOMER%monthly as well application governance for high risk enterprise applications.
Microsoft Defender Endpoint
We onboarded all Workstations and Servers to Microsoft Defender Endpoint and used ASR rules to improves %CUSTOMER% Secure Score.
Microsoft Defender For Identity
We enrolled both %CUSTOMER% domain controllers to Defender For Identity with the Agent and deployed a new GMSA account for deployment. We use this to notify %CUSTOMER% of any identity issues in the environment.
Microsoft Defender for Office
We have created new default Policies in Defender for Office to block Spam and Malware for PCA as well as protecing Microsoft Teams
Intune
We have onboarded all workstations to Microsoft Intunes and created new Applications for Deployment as well as new Secure Score Device Configuration.
Azure Active Directory Premium 2
We have used Conditional access policies to block and monitor users with High and Medium Risk Sign in’s and at Risk Users
Thanks |