{"version":"1.0","provider_name":"RHESUS","provider_url":"https:\/\/rhesus.net\/en\/","author_name":"Aur\u00e9lie Pelletier","author_url":"https:\/\/rhesus.net\/en\/author\/d2536e566799f53f\/","title":"Microsoft 365 Security Audit - RHESUS","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"cTj4TXUoLs\"><a href=\"https:\/\/rhesus.net\/en\/it-solutions\/microsoft-365-security-audit\/\">Microsoft 365 Security Audit<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/rhesus.net\/en\/it-solutions\/microsoft-365-security-audit\/embed\/#?secret=cTj4TXUoLs\" width=\"600\" height=\"338\" title=\"&#8220;Microsoft 365 Security Audit&#8221; &#8212; RHESUS\" data-secret=\"cTj4TXUoLs\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/rhesus.net\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/rhesus.net\/wp-content\/uploads\/2026\/04\/microsoft.webp","thumbnail_width":1920,"thumbnail_height":1280,"description":"Microsoft 365 Security Audit Your Microsoft 365 environment works. But is it truly secure? Most organizations use Microsoft 365 every day for email, files, and collaboration. But few have verified that their configuration actually protects their data. A Microsoft 365 (M365) security audit helps identify: vulnerabilities misconfigurations invisible risks within your environment Before an incident [&hellip;]"}