We collect objective Microsoft 365 configuration evidence, evaluate 140 controls against the CIS Microsoft 365 Foundations Benchmark v6.0.1, and package the results into an offline evidence bundle with a reviewer-ready binder and technical evidence pack. Portable. Ready to hand to an insurer, auditor, client reviewer, or due diligence team.
Your insurer sends a questionnaire. You spend a week pulling screenshots, writing narratives, and hoping it’s enough. PROVE turns that scramble into a single CIS-aligned evidence package.
A prospect or existing client asks for proof. You rewrite the same answers for every questionnaire—and nobody can independently verify any of it.
You’re switching IT providers, or you just hired one. Someone should look at what’s there—and that someone shouldn’t be the one grading their own work.
Instead of pulling screenshots and writing cover letters, you hand the reviewer a single evidence binder that shows what’s configured, what passed, what didn’t, and what still needs a human answer. Built from collected configuration evidence. Deterministic: same evidence in, same outcomes out. A reviewer can check it for themselves.
CIS controls evaluated
CIS benchmark sections
Offline evidence bundle
Changes to your tenant
Extract once, then open START_HERE.html to launch the offline binder.
The thing your reviewer reads. Every control includes an Audit Narrative: the requirement, what was tested, what was found, and how to fix it. Opens offline in any browser.
Anything that needs human follow-up, like a policy document, a signed statement, or a manual export, gets its own checklist entry with exactly what to provide.
The supporting files behind the binder: tenant exports, trace files, and delivery records. A reviewer can trace any outcome back to the source evidence.
SHA-256 checksums, chain of custody, and a gate report showing that 15 integrity checks passed before delivery. The package ships only when there are zero Evidence Unavailable controls. Evidence Required and Attestation Required remain valid worklist outcomes.
If a control cannot be evaluated safely and would become Evidence Unavailable, delivery stops until the issue is resolved. We do not guess.
Agree what we’re checking and what we’re not.
Read-only collection of your Microsoft 365 configuration.
Findings tested against the CIS Microsoft 365 Foundations Benchmark v6.0.1.
Binder, worklists, evidence pack, and integrity artifacts.
You get one ZIP. Follow-up items get a worklist.
Sample output from a PROVE assessment walkthrough. Click to explore each section.
Nine CIS benchmark sections with pass rates, control counts, and inline previews.
All 140 CIS controls in one searchable register. Filter by outcome or keyword. Click any row to expand the full workpaper detail.
Expand any control to see the full workpaper: Audit Narrative, the standard’s requirement, what was tested, the expected result, remediation guidance, findings with values, and links to the source evidence.
Every Non-Compliant control gets a specific remediation step: which admin center, which setting, what to change. Priority-ranked with practical next actions and suggested owners.
Controls that need a policy document, signed statement, screenshot, or manual export are separated into follow-up items. The delivered bundle remains a point-in-time record; supplemental evidence can sit alongside it as governance workpapers.
Common insurance, audit, and compliance questions mapped to specific control evaluations — not opinion. Each answer reflects the worst-case outcome across its mapped controls.
Assessment boundary, methodology, and the seven outcome labels used in the binder.
Checksums, chain of custody, run records, and gate-report evidence show the bundle passed delivery integrity checks before it was allowed to ship.
PROVE runs entirely on a JGS workstation. No tenant data is uploaded to any cloud service or third-party infrastructure. The assessment uses 35 scoped permissions total — 34 application permissions via certificate-based authentication, plus one delegated SharePoint scope for tenant-admin configuration reads. The implemented workflow performs read operations only. Microsoft-verified publisher.
Evidence is retained for a maximum of 30 days following delivery, then securely deleted. You can revoke all permissions at any time by removing the app from Entra ID. The evaluation engine uses deterministic rule-based logic with traceable outcomes.
The control met the evaluated requirement.
The control did not meet the evaluated requirement.
Human-supplied documentation or export is needed.
A management statement is needed.
The control does not apply to the assessed tenant state.
The control was excluded by the declared scope.
Required in-scope evidence could not be collected.
Evidence Unavailable blocks delivery. Non-compliance does not.
Choose the option that fits your workflow.
Not a pen test. Not a vulnerability scan. Not a certification or legal opinion. Not a guarantee your insurer will say yes. Not hosted software, recurring monitoring, or a SaaS subscription. Not an MSP, a SOC, or a helpdesk. We show what’s there. If you want fixes, that’s a separate engagement.
Short call. We confirm fit, agree scope, and schedule the run.