Platform Features

Audit

Threat Report

 Security Configuration Audit: A report that monitors the security settings that have been enabled, disabled or inactive. Gain confidence with comprehensive audits that track changes to security configurations highlighting which settings are enabled, disabled, or inactive to ensure consistent policy enforcement across all environments.

MFA Report

A report that tracks which accounts are protected by MFA and by which methods. Helpful in identifying weaker MFA
methods such as SMS or loopholes that leave users unprotected such as policy exclusions or users not registered yet. Instantly assess MFA adoption, identify weak methods (like SMS), uncover policy exclusions, and flag unregistered or unprotected accounts ensuring no user is overlooked.

Customer Facing QBR Report

Demonstrate the level of protection that your security program is providing. Summarizes MFA roll out status as well
as security incidents that were prevent by having a strong baseline in place. Sell value with visual summaries that showcase MFA rollout progress and security incidents thwarted by strong baselines making quarterly business reviews proof of your protective impact.

SaaS Inventory Report

An inventory of all software applications in user across an organization that highlights potential risk or time waste as well as usage levels for cost optimization. Map all applications in use pinpoint underutilized or risky apps and optimize licensing and spend all in one intuitive dashboard.

Shadow IT Audit

Identify applications that the organization may not be aware of. Useful for identifying risk or in the event of an employee leaving making sure to shut down all accounts and protect organizational data. Uncover and neutralize unmanaged or forgotten apps especially critical during offboarding to safeguard against data exposure and preserve compliance.

Protect

Enforce MFA

A singular view to manage MFA regardless of what licensing your customers have and which method they use across Authenticator and Duo. Centralize MFA oversight across authenticator apps, Duo, and more regardless of licensing to streamline enforceable, robust authentication.

Conditional Access Policies

Easily manage conditional access policies by selecting a customer and enforce Per User or Conditional Access Policy in the Azure environment. Simplify deploying and managing policies with per-user or tenant-wide controls directly from your dashboard.

Configure Security Best Practices

Quickly access and configure security best practices from a single portal. Includes Microsoft best practices documentation, links to Azure & other portals as well as configuring key security items from a single place. Access Microsoft’s recommended security configurations, troubleshooting guides, and critical links, all consolidated into one portal.

Lock User Account

In the event of serious security incident you can quickly Lock accounts, reset passwords & block sign-in for any account across any tenant. Act fast when threats emerge by locking accounts, resetting passwords, or blocking sign-ins across any tenant instantly.

Off-board Users

A best practices workflow to ensure that mailbox and user data is appropriately re-assigned while deprovisioning an account. Use structured workflows to safely reassign mailboxes and user data, ensuring seamless transitions while maintaining security.

Manage User Permissions

Apply security best practices like least privilege access by managing Groups, Security Groups and Mailbox access for users. Enforce least-privilege access by managing groups, security groups, and mailboxes, ensuring only authorized actions are performed.

Detect

Risky Sign-in

Receive alerts in near real-time for high-risk security events like Impossible Travel and Atypical Travel that can indicate unauthorized logins. Instantly detect suspicious activities like “impossible travel” or atypical login patterns, and respond in near real time.

Account Breaches

Receive alerts for suspicious activity detected by Microsoft that indicates an account has been compromised such as mail-forwarding rules, elevated permissions and more. Receive alerts for telltale signs of compromise, such as suspicious mail-forwarding rules or elevated permissions, so you can act at the first sign of trouble.

MFA Disabled

Actionable insights into accounts that have recently been added without, or disabled MFA. Spot accounts with newly disabled or absent MFA setups, empowering you to take corrective action before vulnerabilities arise.

Inactive Accounts

A simple way to identify inactive accounts, which can easily be hijacked by intruders. Identify dormant accounts, often prime targets for unauthorized access, and take preventive action.

Legacy Authentication Enabled

Ensure no accounts have login options susceptible to breaches by identifying any legacy authentication types for all your users. Detect outdated or high-risk authentication methods and enforce modern security standards across your tenant base.

Shadow IT Notifications

Subscribe to weekly or monthly reports that identify newly discovered software or high risk software that is in use. Subscribe to regular updates identifying newly discovered or high-risk SaaS usage so you always stay on top of unmanaged activity.

Why Augmentt?

Augmentt equips MSPs with a unified platform to Audit, Protect, and Detect, offering a complete cycle of SaaS security across multiple tenants.