View options
Report actions
Synthetic demo dataFindings, identities, controls and metrics are fictional. Do not treat values as a real assessment or extract names or domains.
PolarisSecurity Assessment · § 01 Executive Overview

Contoso Defense Systems

Generated May 15, 2026, 7:34 PM ET · trailing 30d
SCAN STALELast scan 96 days old; treat figures as historical until collection is rerun.
manifest only
Posture score
13
/ 100 F
composite grade
First baselinetrend unlocks at next scan
No prior comparison30d window

12 critical and 70 high exposures open across this tenant.

Open findings · by severity164 total · last 30d
Critical
12
High
70
Medium
67
Low
15
§ 01·A

Priority actions

5 items · scheduling pending
01
P0On-Prem: Windows Firewall Disabled on One or More Profiles
5 assets
OwnerNetwork Security
ETA pending
02
P0Critical Security Configuration Gaps Require Action
4 assets
OwnerSecurity Operations
ETA pending
03
P0NSG Rules Allow All Inbound Traffic
4 assets
OwnerCloud/Network Team
ETA pending
04
P0External trust to legacy-supplier.example has SID filtering disabled
impact unmeasured
Ownerowner pending
ETA pending
05
P02 Domain Admins without MFA
impact unmeasured
Ownerowner pending
ETA pending
§ 01·B

Posture at a glance

identity · vulnerability · on-prem
Identity & accessSecure score 56%

Graph Secure Score API · as of 2026-02-08 14:00 UTC

0 admins without MFA · 9 users without MFA

7
Admins
100%
Admin MFA
150
Users
94%
MFA coverage
Vulnerability
85
Tracked vulnerabilities
Upper cap — full list in Findings detail
12
Critical
28
High
0
Exposed hosts
40 critical/high6.8 avg CVSSsecure score
On-premisesCollected

4 sites · 9 DCs · 2 CAs · 4 trusts

0
Tier-0 at risk
0
DCs · EOL Windows
4
ADCS ESC1-8
5 collectors50 linked findingsad.attack path, ad.tier 0 +4
Device posture

Intune deviceManagement

8 devices non-compliant · 72 managed

67%
Compliance
Windows
Top platform · 50 devices
48 compliant8 non-compliant16 unknownWindows 50 · macOS 12
OAuth App Permissions1 high-risk

Graph Applications API · live collection

15
Total apps
4
Admin consented
1
High-risk apps
Top app: DataSync Pro (Unverified) · Most granted permission: User.Read (8)
Sign-In Analysis12 risky

Graph Sign-In Logs API · live collection

120
Failed sign-ins
12
Risky sign-ins
138
Users affected
Top failure: Invalid password (45) · Top geography: United States (4,200) · 12 risky sign-in events flagged in the current window
§ 01·C

Trust & coverage

auditor anchor
Collection confidenceStrong
Payload coverage
100%
Permission scopes OK
100%
Endpoints succeeded
49 / 49
Last scan
Feb 8, 2026
◆ Evidence bundle present◆ Manifest only
Framework coveragePrimary · NIST CSF 2.0
NIST CSF 2.0
50%
10 / 25 controls assessed
CIS v8 IG2
72%
33 / 43 controls assessed
SOC 2 TSC
56%
16 / 27 controls assessed
Hardening gatesNot yet run — results reappear after the first publish or next gate-suite pass for this run id.
§ 01·D

Improve report coverage

2 coverage items · action checklist

Coverage unlock checklist

2 gaps
API error - Polaris retry
Purview retention labels
Retry Purview retention labels, then handle Records Management consent if needed
This is not an Azure Reader issue. Microsoft Graph lists Purview retention labels through a delegated Records Management permission path. Polaris should retry first; if Microsoft still returns an authorization error, the customer Purview or records-management admin must approve RecordsManagement.Read.All for the delegated collection path.
OwnerPolaris first; customer Entra or Purview records-management admin if authorization is missing
Access/artifact neededMicrosoft Graph delegated RecordsManagement.Read.All for retention label reads
Customer actionIf the retry still fails with authorization, approve the delegated Records Management read path.
Polaris actionRetry the endpoint and show the exact Microsoft status code/message if it still fails.
Retry Purview collection
Microsoft lists this endpoint as delegated-only for work or school accounts. It is not fixed by Azure RBAC Reader.
Unlocks after rerunData Protection, Compliance Matrix, Technical Evidence
Evidence not provided
Network Security
Confirm whether network security is in scope
Network Security is either not in scope yet or missing the source needed to assess it. Do not read 0% coverage as a clean network result.
OwnerCustomer Azure/network admin with Polaris support
Access/artifact neededAzure RBAC Reader for cloud network inventory, or firewall/network evidence for non-Azure scope
Customer actionEither mark Network Security out of scope with a reason, or grant/provide the network evidence source.
Polaris actionIf in scope, rerun Azure Resource Graph or ingest the network evidence and link it to findings.
Resolve Network Security coverage
Out of scope is acceptable when intentional. Missing source data should be fixed or explicitly excluded.
Unlocks after rerunNetwork Security
Polarispolaris.securitySecurity Assessment · Stitch V3 · run 20260515T233445Z_ad-hoc
Integrity manifest onlyPage 1 of 5 · Executive Overview
Confidential · Do not redistribute · prepared for Contoso leadership