Complimentary Microsoft MFA Gap Assessment
Request a complimentary Microsoft MFA Gap Assessment from Strategic Defense. We'll identify where MFA coverage falls short across your Microsoft environment, so you can close the gaps before attackers walk through them.
No cost. No obligation.
A focused MFA review offered as a community giveback
MFA is one of the most effective controls an organization can implement, but only when it's applied consistently. In our penetration testing work, we routinely encounter Microsoft environments where MFA is partially deployed, misconfigured, or missing entirely from critical access points.
As a way to give back to the business community, Strategic Defense is offering a limited number of complimentary Microsoft MFA Gap Assessments to selected companies. This review is designed to identify where MFA coverage falls short, giving you a clear picture of your exposure.
This is a no-cost opportunity to understand your MFA posture. There is no obligation attached to participate.
What the assessment is designed to evaluate
An MFA Gap Assessment reviews your Microsoft environment to identify where multi-factor authentication is enforced, where it's missing, and where configuration weaknesses may allow attackers to bypass it entirely.
Even organizations with MFA "enabled" often have gaps: legacy authentication protocols that bypass MFA, conditional access policies with unintended exclusions, service accounts without MFA enforcement, and applications that fall outside policy scope.
These gaps are exactly what attackers look for. If we think about the last 10 clients we've compromised during penetration testing, we'd wager that 8 of them had MFA that we were able to circumvent.
What selected companies will receive
Organizations selected for this complimentary assessment will receive:
A review of MFA enforcement across your Microsoft 365 and Azure AD environment, identifying where coverage exists and where it does not.
Identification of specific gaps such as legacy auth bypass, conditional access misconfigurations, and excluded accounts or applications.
A clear risk summary with practical recommendations for closing identified gaps and strengthening your MFA posture.
Why this matters
MFA bypass is one of the most common paths to compromise we see in real-world penetration tests and incident response engagements. Attackers have moved well beyond simple password attacks. MFA fatigue, token theft, legacy protocol abuse, and conditional access policy gaps are all actively exploited techniques.
The challenge is that many organizations believe they have MFA fully deployed when significant gaps remain. Clicking the "enable MFA" checkbox used to put you in the safe zone, but today there's much more nuance.
Knowing where your gaps are is the first step to closing them. This assessment gives you that visibility.
Who this is for
Each assessment receives dedicated attention and quality. This offering may be particularly relevant for organizations that:
Use Microsoft 365, Azure AD, or hybrid Active Directory and want to validate MFA coverage.
Have MFA enabled but aren't confident it covers all access points, accounts, and applications.
Need to demonstrate MFA coverage for compliance, cyber insurance, or board-level reporting.
How the process works
Step 1: Submit a request
Complete the form below with your company information.
Step 2: Review
Our team will review your submission and determine fit.
Step 3: Direct outreach
Selected companies will be contacted by the Strategic Defense team with next steps and any access requirements.
Step 4: Assessment and findings
We will conduct the MFA Gap Assessment against your Microsoft environment and provide a summary of findings with recommended actions.
Request an assessment
Complete the form below to request a complimentary Microsoft MFA Gap Assessment.
Why Strategic Defense
Strategic Defense helps organizations proactively identify and address real-world security risk before it develops into material business impact. We routinely encounter MFA gaps during our penetration testing engagements, and we know firsthand how attackers exploit them.
Our work is grounded in practical offensive security expertise, disciplined execution, and a commitment to delivering clarity where organizations need it most.
Program Details
A limited number of companies are selected for this complimentary assessment on an ongoing basis. Selected organizations will be notified directly. This offer is provided at no cost and carries no obligation.

