When Trusted Systems Become the Risk
A real-world breach shows how attackers can exploit endpoint management platforms like Intune to gain control at scale. Here’s what SMEs need to know
Madhu Veerappan
2 min read


When Trusted Systems Become the Risk: SharePoint, Intune, and the Expanding Attack Surface
Recent developments across the Microsoft ecosystem highlight a growing pattern in how attackers are operating and where organisations are most exposed.
In a short space of time, we’ve seen:
A critical Microsoft SharePoint vulnerability actively exploited in attacks
CISA issuing guidance following the Stryker incident involving Microsoft Intune
Continued focus on endpoint security platforms designed to detect threats in real time
Individually, these are important. Together, they point to something more significant.
A Shift in Attacker Focus
Traditionally, cyberattacks focused on endpoints, compromising individual devices and moving laterally across networks.
That model is changing.
Attackers are increasingly targeting:
Collaboration platforms (SharePoint)
Identity systems (Entra ID / Azure AD)
Endpoint management platforms (Intune)
These systems form the control layer of modern IT environments.
If compromised, they provide:
Broad access to data and systems
The ability to execute actions across multiple devices
A faster path to operational disruption
In many cases, attackers no longer need complex exploit chains, they can use legitimate tools and access.
The SharePoint Risk
The actively exploited SharePoint vulnerability is a reminder that widely used business platforms are high-value targets.
For many organisations, SharePoint is:
A central repository for sensitive data
Integrated with identity and access controls
Accessible across users, devices, and locations
A critical flaw in this layer can expose:
Confidential documents
Internal communications
Organisational structure and permissions
For SMEs, where access controls are often less mature, the impact can be significant.
The Intune Lesson
The Stryker incident reinforces a different but related risk.
Instead of exploiting software vulnerabilities, attackers reportedly:
Gained access to an Intune administrative account
Used legitimate management functionality
Carried out disruptive actions at scale
This highlights a key issue:
If attackers control your management platform, they control your environment.
The Role of Endpoint Security
Solutions designed to detect and respond to threats in real time remain important.
However, they are not a complete solution.
If an attacker:
Authenticates as a legitimate admin
Uses approved tools and workflows
Traditional detection mechanisms may not trigger.
This creates a gap between:
Threat detection
Control plane security
Where Organisations Are Exposed
Across SME environments, common patterns include:
Over-reliance on default configurations
Excessive administrative privileges
Inconsistent MFA enforcement
Limited visibility into admin activity
Treating platforms like SharePoint and Intune as operational tools, not security boundaries
These gaps are not unusual, but they are increasingly being targeted.
Practical Considerations
Organisations should prioritise:
1. Securing Identity and Access
Enforce MFA across all users, especially administrators
Limit privileged roles using least privilege principles
Regularly review access and permissions
2. Hardening Core Platforms
Apply security updates promptly (including SharePoint)
Review sharing settings and external access controls
Ensure security baselines are configured
3. Monitoring Administrative Activity
Enable logging across identity and management platforms
Review unusual sign-ins and configuration changes
Implement alerting for high-risk actions
4. Treating the Control Layer as Critical
Recognise that platforms like Intune, Entra ID, and SharePoint are central to security
Protect them accordingly
A Broader Shift
These developments are not isolated incidents.
They reflect a broader change:
Security is no longer just about protecting devices, it’s about protecting the systems that control them and the platforms where data lives.
Final Thoughts
For SMEs, this presents both a challenge and an opportunity.
The challenge is clear: modern environments introduce new risks that are often underestimated.
The opportunity lies in addressing them early, before they become incidents.
If your organisation relies on Microsoft 365, it’s worth reviewing whether your current setup reflects how attackers are actually operating today.
