Open
Cached
·
just now
82/100
SECURITY SCORE
Certificate Information
Subject
C=US, ST=WA, L=Redmond, O=Microsoft Corporation, CN=*.cloud.microsoft.com
Issuer
C=US, O=Microsoft Corporation, CN=Microsoft Azure RSA TLS Issuing CA 03
Valid From
November 07, 2025
Valid Until
May 06, 2026
125 days
Public Key
RSA
2048 bit
Adequate
Signature Algorithm
SHA384-RSA
SHA-256 Fingerprint
A2:FE:01:35:93:D6:C2:4C:9D:01:DD:70:7E:E6:B9:B2:88:3D:A2:13:59:F2:95:06:EC:D9:1C:67:74:B4:48:44
Alternative Names
Security Configuration
TLS Protocols
TLS 1.2
TLS 1.3
Forward Secrecy
Supported
(Modern clients use PFS)
HTTP Security Headers
Status
Strict-Transport-Security
Good
max-age=31536000; includeSubDomains
Content-Security-Policy
Basic
require-trusted-types-for; script-src; style-src; +9 more
require-trusted-types-for 'script';script-src 'self' 'unsafe-inline' 'unsafe-eval' aadcdn.msauth.net aadcdn.msftauth.net *.cdn.office.net https://partner.dev.oasis.microsoft.com https://webshell.suite.office.com https://webshell.suite.officeppe.com https://outlook.office.com https://amcdn.msauth.net https://amcdn.msftauth.net https://web.vortex.data.microsoft.com https://js.monitor.azure.com https://graph.microsoft.com *.office.com https://a-ring.msedge.net https://b-ring.msedge.net https://k-ring.msedge.net https://s-ring.msedge.net https://ow1.res.office365.com https://gtm-dyn-direct.office365.com https://outlook.live.com https://r4.res.office365.com;style-src 'self' *.cdn.office.net 'unsafe-inline' https://www.microsoft.com/;default-src 'self';img-src * 'self' data: https://outlook.office.com https://sdfpilot.outlook.com *.cdn.office.net https://webshell.suite.office.com blob:;connect-src 'self' https://pp1.prd.bmc.teams.microsoft.com https://odc.edog.officeapps.live.com https://eu-office.events.data.microsoft.com *.sharepoint.com *.officeapps.live.com https://graph.microsoft.com https://config.edge.skype.net https://config.edge.skype.com https://login.microsoftonline.com https://browser.pipe.aria.microsoft.com https://browser.events.data.microsoft.com *.office365.com https://outlook.cloud.microsoft https://teams.cloud.microsoft *.office.com *.cdn.office.net res-dev.cdn.officeppe.net https://consentreceiverfd-prod.azurefd.net https://my.microsoftpersonalcontent.com https://petrol.office.microsoft.com https://admin.microsoft.com https://petrol-int.office.microsoft.com https://clients.config.office.net https://api.onedrive.com *.sharepoint-df.com https://eu-mobile.events.data.microsoft.com https://augloop.svc.cloud.microsoft https://*.augloop.svc.cloud.microsoft wss://augloop.svc.cloud.microsoft wss://*.augloop.svc.cloud.microsoft wss://gcc.augloop.svc.cloud.microsoft wss://*.gcc.augloop.svc.cloud.microsoft wss://*.augloop-gcc.office.com https://clients.config.gcc.office.net https://cdn.config.centro.core.microsoft;font-src 'self' data: 'unsafe-inline' cdn.create.microsoft.com https://c.s-microsoft.com *.cdn.office.net *.sharepointonline.com;frame-ancestors 'self' data: https://support.office.com;frame-src 'self' * ms-word: ms-excel: ms-powerpoint:;trusted-types default domPurifyHTML shellInfoPolicy ocvPolicy cdn-url#oneshell safe-xml#oneshell script-url#webpack nextjs#bundler nextjs 1DSScriptURL MeControlScriptURL @centro/hvc-loader dompurify html2canvas-feedback @azure/ms-rest-js#xml.browser 'allow-duplicates';report-uri https://csp.microsoft.com/report/OfficeAppHome-PROD;report-to AppHomeReportToEndpoint
X-Frame-Options
Missing
Not configured
X-Content-Type-Options
Missing
Not configured
Referrer-Policy
Missing
Not configured
Permissions-Policy
Missing
Not configured
Recommendations
- • Consider adding 'preload' to HSTS for maximum security
- • Improve CSP by adding more specific directives and removing 'unsafe-inline'
- • Add X-Frame-Options: DENY or SAMEORIGIN to prevent clickjacking
- • Add X-Content-Type-Options: nosniff
- • Add Referrer-Policy header (recommended: strict-origin-when-cross-origin)
- • Consider adding Permissions-Policy to control browser features
CAA Records (Certificate Authority Authorization)
CAA Records
Not Configured
(Any CA can issue certificates)
CAA Issues
- • No CAA records configured - any CA can issue certificates
Recommendations
- • Implement CAA records to restrict which CAs can issue certificates for your domain
- • This adds an extra layer of security against unauthorized certificate issuance
- • Example: Add CAA record 'example.com. CAA 0 issue "letsencrypt.org"'
- • Consider adding 'iodef' record to receive security incident reports