Security products are frequently installed with the expectation that they will remain operational for years, even decades. At the outset, significant effort is dedicated to configuring these tools to counter existing threats and comply with regulatory standards. During this phase, post-installation reports are carefully reviewed, tests are performed, false positives are addressed, and regular discussions with vendors to resolve support tickets are commonplace.
Over time, however, as the system stabilizes, focus naturally shifts to other pressing matters. Although proactive security vendors occasionally update customers about new features or recommend adjustments, many organizations only revisit their configurations when faced with a noticeable decline in performance—or worse, a security breach.
The security landscape is constantly changing, and solutions that fail to adapt to emerging threats or evolving infrastructure are at risk of becoming obsolete. Misconfigurations, neglected features, and outdated policies can introduce vulnerabilities that compromise an organization’s overall security. Conducting a configuration review helps address these issues, ensuring your solution continues to function effectively. Drawing on years of experience performing hundreds of configuration reviews for large enterprises, I wanted to share valuable insights into the process of evaluating security controls. This blog incorporates real-world examples from my work in the email security cloud, providing you with a clear understanding of what to expect when you request a review from your vendor.
It’s important not to wait for a security incident to take action. Conducting a comprehensive, expert-led configuration review at least annually is essential. However, maintaining the effectiveness and optimization of your solution involves more than just periodic reviews. Teams should consistently follow best practices for their security solutions and perform routine housekeeping tasks much more frequently. Additionally, vendors should engage with customers every six months to discuss product roadmaps and recent updates, enabling better planning for upgrades well ahead of time.
A secure configuration review is a process your security vendor can lead, but it helps to know what to expect. You’ll examine and assess your organization’s IT systems, applications and security solutions to identify vulnerabilities, misconfigurations and other security risks that could be lurking. Here’s that process broken down into three steps.
Meet with your security vendor to walk through your solution’s current configurations. This allows for real-time discussion of settings that might deviate from best practices and provides context for decisions that may seem suboptimal on paper but serve specific business needs.
After the meeting, your vendor will provide a report outlining their findings. These typically fall into the following categories:
Misconfigurations
These are critical issues that directly impact security or efficacy. Examples include:
Suggestions for improvement
These address opportunities to enhance performance or user experience. For instance, adjusting outbound email retry schedules can improve delivery notifications for users.
New features
Often overlooked, new features can significantly improve security and functionality. Highlighting these during reviews ensures they’re not forgotten.
Housekeeping
Regular maintenance tasks center on:
An actionable report often organizes the findings by two criteria:
Address your findings based on risk prioritization. Simple issues may require minimal follow-up, while complex problems might demand additional meetings, ongoing projects or consultancy engagements. The key is taking timely action to determine needs, mitigate risks and improve performance.
Neglecting reviews until issues arise is a costly gamble.By collaborating with your vendor for annual evaluations and maintaining a proactive schedule with periodic assessments, you can save considerable time, effort, and resources. In the end, conducting thorough configuration reviews is a strategic investment in resilience—ensuring your security tools perform as intended, both today and in the future.
When was the last time your organization reviewed its security configurations? If it’s been more than six months, schedule a review today—your organization’s resilience depends on it.