3 admin accounts have no MFA method registered: James Wilson, Sarah Chen, and Michael Torres. These accounts have elevated privileges and are high-value targets for credential attacks.
The tenancy has 7 Global Administrator accounts. Microsoft recommends no more than 2–3. Excess global admins increase the attack surface and make it harder to track privileged activity.
No active Conditional Access policies detected. Access to Microsoft 365 is ungoverned — any user can sign in from any device, location, or risk level without restriction.
| User | MFA Status | |
|---|---|---|
| James Wilson | [email protected] | No MFA |
| Sarah Chen | [email protected] | No MFA |
| Michael Torres | [email protected] | No MFA |
| Emma Roberts | [email protected] | MFA Enabled |
| David Park | [email protected] | MFA Enabled |
| User | Role | MFA Status | Last Sign-In |
|---|---|---|---|
| James Wilson | Global Administrator | No MFA | 3 days ago |
| Sarah Chen | Global Administrator | No MFA | 12 days ago |
| Alex Kumar | Exchange Administrator | MFA Enabled | 1 day ago |
| Lisa Wang | SharePoint Administrator | MFA Enabled | Today |
Every SharePoint site is scanned recursively — folders, subfolders, and individual files. Group memberships are resolved so you see exactly who has access, not just a group name.
When a folder shows a group name below, refer here to see exactly who that group contains.
Click any site to expand. Click folders to drill down into subfolders and see individual permissions.
Start generating reports like this for your clients.