M365 & Azure Breach Detection & Assessment

Detect breaches and what the bad guys did, and secure your Entra, Azure, and Microsoft 365 environment for multi-tenant MSPs

One Click to M365 Security

Just log into your Microsoft account and we’ll take care of the rest!
It’s just one click to go beyond the included Microsoft 365, Defender for Office 365, Entra, and Azure notifications and monitoring.
Lavawall® processes the complex Entra ID logs, correlates the data with your known workstations to reduce false positives, and gives actionable notifications that keep your clients safe while saving you a lot of time and money!
To set up Microsoft 365, Entra, and Azure integration in Lavawall®, just click the M365 Account Setup button.


What does Lavawall® check in Microsoft 365, Entra, and Azure?

Lavawall® considers where you have computers and things like IPv6 privacy so you don’t have the false positives that plague Microsoft’s built-in tools and most other third-party tools.

While preventing false positives, Lavawall®'s comprehensive ITDR (Identity Threat Detection & Response) approach looks at an ever-expanding list of risk indicators, including:
  • Potential breaches determined by analyzing a combination of indicators
  • Changes to mail accounts, like setting up mail forwarding, and suspicious mailbox rules
  • Suspicious login patterns and logins from weird locations
  • Logins from more than one location
  • Impossibly fast travel between two different locations (Microsoft Entra does this with “Risky Users.&rsquo Lavawall® uses much more accurate location data and displays actual speed and distance for you to get the full picture
  • Credential stuffing attacks
  • Brute force attacks
  • Password Spray Attacks
  • MFA Bombing
  • MFA Fatigue
  • Session hijacking
  • Lateral movement
  • Newly-installed and risky Entra and Azure Apps
  • Dormant account reactivation
  • Activity on disabled accounts
  • Failed MFA and MFA abuse
  • Risky Events
  • Security Alerts
  • Malicious addresses
  • Unusual file download, deletion, sharing activities
  • Unusual mail access and configurations
  • Privilege escalation
  • Activity after hours
  • Much more...

Your Microsoft® security score is useful; however, real security goes much deeper. Lavawall® also considers:
  • Multi-Factor Authentication strength
  • Inactive account monitoring
  • External accounts
  • Legacy authentication
  • Computers that are in Lavawall®, but missing from Intune and vice versa
  • Unmanaged devices
  • M365 and Entra license utilization

We also look at potential administrator abuses, such as:
  • Privilege Escalation
  • Self-Privilege Escalation
  • Mailbox Permission Change
  • User dumping



Microsoft 365 / Entra / Azure Dashboard

It’s time to get a quick view of your clients’ Microsoft 365 risks without the noise and false positive in other ITDR (Identity Threat Detection & Response) tools.
Breach detection and configuration summaries for Microsoft 365, Azure, and Entra.

Click any of the summaries for details like this:
Note: Computers running the Lavawall® agents for Windows, Mac, or Linux are automatically excluded from login sequences that include a failed login and an unknown successful login location. This significantly cuts down false positives.
YOu can also click the plus icon to add IP addresses to trusted location lists.
Details for Suspicious login sequences like impossible travel and credential stuffing.

Click the timeline icon to see details about a specific user including:
  • All Microsoft 365, Entra, and Azure activity
  • Indicators of Compromise & Breach Signals
  • Login attempts with automatically enriched data to show you the Internet Service Provider, IP type, and location
  • File access activity in OneDrive, SharePoint, and Teams
  • Email access activity
  • Sharing activity
  • User Activity Timeline


    What should an MSP do with a new client who had an Office 365, Microsoft 365, or Azure Breach?

    1. Add them as a client in Lavawall
      (On the left side, under Client Orgs, click Add, fill out the information and click Create Organization
    2. If necessary, select the client name from the top client drop-down menu.
    3. Click M365 Account Setup at the top of the dashboard (in the orange rectangle below
    4. Login to Microsoft 365 and approve the read-only security permissions.
    5. Within a few minutes, we’ll analyze M365 and Azure logs, mail rules, Intune, Entra ID settings, and other indicators of compromise.
      A summary will quickly appear on the dashboard with details for each available in Lavawall®'s Microsoft 365 Security and Breach system.
    Setup Microsoft 365 Synchronization for breach discovery and M365 security configuration

    Yes, it’s really just a one-click (plus login) setup to immediately learn if, how, and when your Microsoft 365 tenant was breached!

    Setup Microsoft 365 Synchronization for breach discovery and M365 security configuration

    While Lavawall® is refreshing your data, you'll see a real-time progress bar go across the top of the dashboard. This typically lasts less than 5 minutes an happens at least once per day.

    From the “All Companies” dashboard view, you can also initiate the setup by clicking the Setup button beside any companies that haven't been set up yet in the Microsoft 365 summary view. You can quickly locate the company using the search box as well.

    Setup Microsoft 365 Synchronization for breach discovery and M365 security configuration from multi-tenant Lavawall® view


    Integrated endpoint, Active Directory, and Microsoft 365 / Entra

    Lavawall® can use Intune data for refinement; however, it also correlates the Windows, Mac, and Linux data with Microsoft 365 and Entra logs as well as Active Directory logs.
    This allows Lavawall® to reduce false positives found in other Microsoft 365 and Entra security products like SaaS Protect, Petra, and Inforcer.
    It also allows you to see truly inactive accounts in Hybrid Active Directory / Entra setups, where some users login on-premise and others are fully remote avoid accidental lockouts with tools like Netwrix.
    Device login details including Microsoft 365



    If you have any questions or need further assistance, feel free to reach out through our chat, phone or email on our contact page!