Assessment State
At Risk
12.6% Security Posture Score (Composite Posture Score)
Graph Secure Score API · as of 2026-02-08 14:00 UTC
0 admins without MFA · 9 users without MFA
4 sites · 9 DCs · 2 CAs · 4 trusts
Intune deviceManagement
8 devices non-compliant · 72 managed
Graph Applications API · live collection
Graph Sign-In Logs API · live collection
Executive Summary
IT operations assessment and security posture score review for Contoso Defense Systems. 164 findings identified across 9 risk domains, with 12 critical and 70 high-severity items defining the current action window. Evidence landed from 49/49 collection endpoints in this run.
What Matters Most
Start here before the deeper evidence and benchmark sections.
Open
164
Secure Score
56.7%
MFA
94% / 100%
Weights live findings, evidence-backed controls, and collection coverage. It is not the same as Microsoft Secure Score.
Assessment State
At Risk
12.6% Security Posture Score (Composite Posture Score)
Evidence Confidence
Strong
100% endpoint coverage with resilience verified
Immediate Workload
82
Critical and high-severity items needing action in the next 30 days
Immediate Risk Snapshot
The first three metrics drive urgency and workload.
Critical Risks
12
Immediate executive attention
High Risks
70
Priority queue this month
Open Findings
164
164 total findings in scope
Coverage and Guardrails
These metrics explain confidence and baseline protections.
Coverage Confidence
100%
Strong evidence coverage
Secure Score Benchmark
56.7%
Supporting Microsoft benchmark, not the posture decision
MFA Adoption
94% / 100%
Users / admins protected
Change Tracking
No prior run available. This run establishes the baseline for future deltas.
New
Findings present now that were absent in the prior run.
Resolved
Findings that disappeared since the prior run.
Improved
Controls that moved into a stronger assessed state.
Worsened
Controls that moved into a weaker assessed state.
Coverage Changed
0
0 assessed controls vs prior run (0 → 0).
What To Do Next
Priority action guidance with expected impact, dependency context, and evidence-backed closure criteria.
Expected Impact: On-premises infrastructure control 'Windows Firewall Disabled on One or More Profiles' is not met. Windows Firewall disabled on 1 profile(s): Public. (Reduces operational risk and improves control assurance)
Closure Criteria: See portal verification steps
Dependency Guidance: Admin role and licensing as required
Assessability Reason: Assessed from collected tenant telemetry.
Evidence Freshness: Current assessment run
Expected Impact: Critical Security Configuration Gaps Require Action is below the expected baseline. Current state is 12 against a target of 0, which weakens endpoint hardening and attacker containment. (Reduces operational risk and impr
Closure Criteria: See portal verification steps
Dependency Guidance: Admin role and licensing as required
Assessability Reason: Assessed from collected tenant telemetry.
Evidence Freshness: Current assessment run
Expected Impact: NSG Rules Allow All Inbound Traffic is below the expected baseline. Current state is 1 against a target of 0, which increases cloud exposure, resilience, and recovery risk. (Reduces operational risk and improves control
Closure Criteria: See portal verification steps
Dependency Guidance: Admin role and licensing as required
Assessability Reason: Assessed from collected tenant telemetry.
Evidence Freshness: Current assessment run
Expected Impact: Legacy authentication protocols (like IMAP, POP3, and SMTP) bypass modern security controls including MFA, making them a prime target for attackers. Credential stuffing and password spray attacks frequently target legacy
Closure Criteria: See portal verification steps
Dependency Guidance: Admin role and licensing as required
Assessability Reason: Assessed from collected tenant telemetry.
Evidence Freshness: Current assessment run
Expected Impact: 40 users (26.7% of your workforce) are not targeted by any Conditional Access policy that requires MFA. These users can sign in with just a password, making them vulnerable to credential theft, phishing, and password spr
Closure Criteria: See portal verification steps
Dependency Guidance: Admin role and licensing as required
Assessability Reason: Assessed from collected tenant telemetry.
Evidence Freshness: Current assessment run
Board Decision Points
Recommended decision: Approve cutoff after report-only pilot
Risk acceptance tradeoff: Legacy clients may fail; requires exception process
Impacted group: Users on older mail clients or scripts
Decision window: 7-21 days
Executive Intelligence
Environment
Contoso Defense Systems operates a Microsoft 365 environment with 150 users and 150 managed devices across 3 verified domains.
Score Clarity
Microsoft Secure Score is 56.7%, while the broader composite posture score is 12.6%. The composite score weights live findings, evidence-backed controls, and collection coverage, so it is stricter than Secure Score alone. The gap between those measures indicates material risk remains despite partial control coverage. MFA coverage stands at 94%, with gaps remaining that expose the organization to credential-based attacks.
Immediate Attention
This assessment identified 164 findings, including 12 critical and 70 high-severity issues requiring immediate attention. The highest priority finding — "On-Prem: Windows Firewall Disabled on One or More Profiles" — should be the first item addressed.
This assessment analyzed 37 of 48 available security data sources. The findings and recommendations in this report are based on the data that was successfully collected.
To expand coverage
Confidence Context
Coverage
100%
Evidence-backed section coverage.
Freshness
May 15, 2026 23:34 UTC
Latest evidence timestamp surfaced here.
Source
Snapshot-based evidence
9 unresolved collection gaps affect confidence.
Bias / Limits
9 unresolved collection gaps still limit report-wide certainty.
Compliance Benchmarks
73%
50%
56%
Visibility Constraints
These are visibility constraints, not failing controls. They explain where the current run cannot make a stronger claim yet.
Affected Domains
Network Security
Collection gap
9
No live collection or usable manual artifact was available for this input.
Unlocks: the missing evidence needed to move controls out of Not Assessed.
Examples access_review_summary, terms_of_use_summary, lifecycle_summary
Threat Distribution
Exposure Vectors
Strategic Roadmap
Positive Indicators
User MFA Adoption Is Above 90%
Administrative MFA Coverage Is Complete
Conditional Access Enforcement Is Active
Device Compliance Rate Is Above 80%
Email Authentication Controls Are Configured
Backup Resilience Baseline Is Healthy
164
Security findings with remediation steps
0%
Framework controls passing
Raw Data
Collection telemetry and technical proof
Critical — P0
Respond within 72 hours
Active exploitation risk or data exposure
High — P1
Respond within 7 days
Significant gap in security controls
Medium — P2
Respond within 30 days
Hardening opportunity or partial gap
Low — P3
Respond within 90 days
Best-practice improvement
Overview
Risk snapshot and KPIs
Findings
Detailed issues with remediation
Compliance
Framework alignment matrix
Technical Evidence
Raw data and collection proof
Organization
Contoso Defense Systems
Tenant ID
a1b2c3d4-e5f6-7890-abcd-ef1234567890
Users
150
Managed Devices
150
Verified Domains
Run the Polaris collector script against Contoso Defense Systems to gather security telemetry — identity configuration, endpoint posture, email transport rules, Conditional Access policies, and complementary compliance evidence. Results are encrypted and uploaded for analysis.
Quick Start
PS> .\Invoke-SecurityCollection.ps1 -OutputPath .\results
When Azure FinOps telemetry is complete, this section highlights specific resources with quantified savings.
Total Licenses
185
Assigned
129
Unassigned
56
Est. Annual Savings
$0
Utilization
69.7%
Microsoft 365 Business Premium
Assigned
120
Total
130
Utilization
92.3%
EXCHANGESTANDARD
Assigned
5
Total
5
Utilization
100.0%
POWER_BI_STANDARD
Assigned
4
Total
50
Utilization
8.0%
Microsoft_Teams_Exploratory_Dept
Assigned
0
Total
0
Utilization
0.0%
| SKU | Assigned | Total | Utilization |
|---|---|---|---|
| Microsoft 365 Business Premium | 120 | 130 | 92.3% |
| EXCHANGESTANDARD | 5 | 5 | 100.0% |
| POWER_BI_STANDARD | 4 | 50 | 8.0% |
| Microsoft_Teams_Exploratory_Dept | 0 | 0 | 0.0% |
Active Directory health telemetry collected from domain: —
Health Score
0%
Domain
—
Controls Passing
4
Controls Failing
4
Visible queue updates as filters change./searchjkmovexcheck?help
Status appears only when a finding is not open. Severity is normalized from collected evidence; internal owners and due dates stay out of the shared report.
This control gap increases security and operational risk. Resolve promptly to reduce breach likelihood, compliance exposure, and avoidable recovery cost.
| Infrastructure Configuration |
|---|
| Windows Firewall disabled on 1 profile(s): Public |
Invoke-PolarisCollection -Modules All -OutputPath ./resultsONPREM-FW-001 status: pass
Program-derived from explicit closure text or the first verification outcome.
Data Source: onprem_infra_assessment.findings[ONPREM-FW-001]
Severity Basis: Severity based on Critical impact and affected scope.
This control gap increases security and operational risk. Resolve promptly to reduce breach likelihood, compliance exposure, and avoidable recovery cost.
| Infrastructure Configuration |
|---|
| Windows Firewall disabled on 1 profile(s): Public |
Invoke-PolarisCollection -Modules All -OutputPath ./resultsONPREM-FW-001 status: pass
Program-derived from explicit closure text or the first verification outcome.
Data Source: onprem_infra_assessment.findings[ONPREM-FW-001]
Severity Basis: Severity based on Critical impact and affected scope.
This finding indicates measurable security and business risk. Delayed remediation increases the likelihood of operational disruption, compliance impact, and avoidable response cost.
| Control / Recommendation | Priority | Score Impact |
|---|---|---|
| Do Not Allow Users To Grant Consent To Unmanaged Applications | Critical | 10.0 |
| Ensure Sign-In Risk Policy Is Enabled | Critical | 8.0 |
| Ensure User Risk Policy Is Enabled | Critical | 8.0 |
Showing 3 of 12 total
Get-MgSecuritySecureScore -Top 1 | Select-Object CurrentScore,MaxScoreDevice-015 meets target baseline (0) using vulnerability_data.critical_count.
Program-derived from explicit closure text or the first verification outcome.
Data Source: vulnerability_data.critical_count
Severity Basis: Severity based on Critical impact and affected scope.
This finding indicates measurable security and business risk. Delayed remediation increases the likelihood of operational disruption, compliance impact, and avoidable response cost.
| NSG Name | Location | Rules |
|---|---|---|
| nsg-edge-westus2 |
az graph query -q "Resources | summarize count() by type | order by count_ desc" -o tableNetwork-010 meets target baseline (0) using arm_network_nsgs.
Program-derived from explicit closure text or the first verification outcome.
Data Source: arm_network_nsgs
Severity Basis: Severity based on Critical impact and affected scope.
A compromise in the legacy-supplier forest can inject a Domain Admin SID into CORP via SID history, yielding tier-0 access without requiring any direct CORP credential theft.
Get-ADTrust -Filter * | Select Name,SIDFilteringQuarantinedCommand returns the expected value above.
Program-derived from explicit closure text or the first verification outcome.
A stolen password — even via phishing, credential stuffing, or LSASS dump on a tier-1 host — yields direct tier-0 access with no second factor blocking the attacker.
Get-MgUserAuthenticationMethod -UserId <UPN>Command returns the expected value above.
Program-derived from explicit closure text or the first verification outcome.
Adversary with prior domain compromise can issue Kerberos TGTs that pass every DC's validation indefinitely. Current ticket lifetime (10h default) is irrelevant once krbtgt is stolen.
Get-ADUser krbtgt -Properties PasswordLastSet | Select PasswordLastSetCommand returns the expected value above.
Program-derived from explicit closure text or the first verification outcome.
Attacker with control of the vendor principal can modify ACLs on protected accounts (Domain Admins, Enterprise Admins, krbtgt) and maintain persistence via hourly SDProp reapplication.
(Get-Acl 'AD:CN=AdminSDHolder,CN=System,DC=corp,DC=contoso,DC=local').AccessCommand returns the expected value above.
Program-derived from explicit closure text or the first verification outcome.
Compromise of DAL-PRINT01 yields TGTs for every user who has authenticated to it, including potentially Domain Admin accounts.
Get-ADComputer DAL-PRINT01 -Properties TrustedForDelegationCommand returns the expected value above.
Program-derived from explicit closure text or the first verification outcome.
Compromise of HSV-FILE02 yields domain-wide TGT harvesting, including tier-0 credentials used to administer the file share.
Get-ADComputer HSV-FILE02 -Properties TrustedForDelegationCommand returns the expected value above.
Program-derived from explicit closure text or the first verification outcome.
Adversary on any domain-joined host can enroll a DC authentication certificate and perform DCSync, Golden Certificate, or silent tier-0 pivot.
certutil -v -template DomainControllerAuthentication | findstr /I 'ENROLLEE_SUPPLIES_SUBJECT'Command returns the expected value above.
Program-derived from explicit closure text or the first verification outcome.
Any authenticated domain user can enroll a certificate that authenticates as Domain Admin, bypassing MFA entirely.
certutil -v -template CorpUserSmartcard | findstr /I 'ENROLLEE_SUPPLIES_SUBJECT'Command returns the expected value above.
Program-derived from explicit closure text or the first verification outcome.
PetitPotam / PrinterBug coercion + relay to unsigned SMB yields code execution in the victim's context — often ending in domain compromise.
Get-SmbServerConfiguration | Select RequireSecuritySignatureCommand returns the expected value above.
Program-derived from explicit closure text or the first verification outcome.
Identity compromise enables tenant-wide privilege abuse. Verizon DBIR 2024 reports 53% of breaches involve stolen credentials, and Microsoft reports MFA blocks 99.9% of automated account attacks.
Legacy authentication protocols (like IMAP, POP3, and SMTP) bypass modern security controls including MFA, making them a prime target for attackers. Credential stuffing and password spray attacks frequently target legacy authentication. Leaving these protocols enabled creates a backdoor that undermines all MFA investments.
| User | Protocol | Last Sign-in |
|---|---|---|
| david.mitchell@contoso.com | IMAP4 | Feb 11, 2026 21:14 |
| patricia.kowalski@contoso.com | IMAP4 | Feb 12, 2026 07:14 |
| robert.chen@contoso.com | SMTP | Feb 12, 2026 15:14 |
Get-MgAuditLogSignIn -Filter "clientAppUsed eq 'Exchange ActiveSync' or clientAppUsed eq 'Other clients'" -Top 10 | Select UserPrincipalName, ClientAppUsed, StatusGet-MgIdentityConditionalAccessPolicy | Where-Object {$_.Conditions.ClientAppTypes -contains 'exchangeActiveSync' -and $_.GrantControls.BuiltInControls -contains 'block'} | Select DisplayName, StateNo results or only blocked attempts
Program-derived from explicit closure text or the first verification outcome.
Data Source: conditional_access.policies
Severity Basis: Severity based on High impact and affected scope.
Identity compromise enables tenant-wide privilege abuse. Verizon DBIR 2024 reports 53% of breaches involve stolen credentials, and Microsoft reports MFA blocks 99.9% of automated account attacks.
| User (Reason) |
|---|
| david.mitchell@contoso.com (Not covered) |
| patricia.kowalski@contoso.com (Not covered) |
| robert.chen@contoso.com (Not covered) |
| lisa.nakamura@contoso.com (Not covered) |
| kevin.patel@contoso.com (Not covered) |
Showing 5 of 40 total
# Re-run CA coverage analysis after policy updates
# Expected: 0 unprotected usersGet-MgIdentityConditionalAccessPolicy | Where-Object { $_.Conditions.Users.IncludeUsers -contains 'All' -and $_.GrantControls.BuiltInControls -contains 'mfa' } | Select DisplayName, StateAll users covered by MFA policy
Program-derived from explicit closure text or the first verification outcome.
Data Source: ca_mfa_coverage.total_users
Severity Basis: Severity based on High impact and affected scope.
Identity compromise enables tenant-wide privilege abuse. Verizon DBIR 2024 reports 53% of breaches involve stolen credentials, and Microsoft reports MFA blocks 99.9% of automated account attacks.
| User | Risk Level | Risk State | Last Updated |
|---|---|---|---|
| marcus.williams@contoso.com | High | At Risk | Feb 12, 2026 04:50 |
| jennifer.park@contoso.com | High | At Risk | Feb 12, 2026 04:50 |
| emily.rodriguez@contoso.com | Medium | At Risk | Feb 12, 2026 04:50 |
| james.okafor@contoso.com | Medium | At Risk | Feb 12, 2026 04:50 |
| rachel.kim@contoso.com | Medium | Remediated | Feb 12, 2026 04:50 |
| thomas.bergstrom@contoso.com | Low | Dismissed | Feb 12, 2026 04:50 |
Get-MgRiskyUser -Filter "riskLevel eq 'high'" | Select UserPrincipalName, RiskLevel, RiskLastUpdatedDateTimeGet-MgIdentityConditionalAccessPolicy | Where-Object {$_.Conditions.UserRiskLevels -ne $null} | Select DisplayName, StateNo results (all high-risk users remediated)
Program-derived from explicit closure text or the first verification outcome.
Data Source: risky_users.high_risk_count
Severity Basis: Severity based on High impact and affected scope.
Detection and response gaps increase dwell time and breach cost. IBM reports organizations with mature detection/response capabilities reduce breach impact by more than $1M compared to low-maturity peers.
| Alert Pattern | Severity | Count | Top Context | Latest Seen |
|---|---|---|---|---|
| Impossible travel activity | High | 1 | Status: New | Feb 05, 2026 |
| Suspicious inbox forwarding rule created | High | 1 | Status: New | Feb 03, 2026 |
| Email messages containing malicious URL removed after delivery | Medium | 1 | Status: New | Feb 06, 2026 |
Showing top 3 alert patterns from 3 active alerts.
Get-MgSecurityAlert -Filter "severity eq 'high' or severity eq 'critical' or severity eq 'medium'" -Property Id, Title, Severity, Status | Where-Object {$_.Status -ne 'resolved'} | Select Title, SeverityGet-MgSecurityAlert -Top 50 | Group-Object Status | Select Name, CountNo unresolved critical or high alerts; medium alerts under review
Program-derived from explicit closure text or the first verification outcome.
Data Source: security_alerts.critical_count
Severity Basis: Severity based on High impact and affected scope.
Business email compromise remains the top cybercrime loss vector. FBI IC3 2024 reports median BEC losses near $50,000 per incident, with larger enterprises seeing seven-figure fraud exposure.
Users are not protected by click-time malicious URL inspection, increasing phishing success probability.
| Email Security Control |
|---|
| Safe Links Status |
Get-SafeLinksPolicy | Select-Object Name,IsEnabledGet-SafeLinksRule | Select-Object Name,State,RecipientDomainIsIsEnabled = True for default and scoped policies
Program-derived from explicit closure text or the first verification outcome.
Data Source: email_security
Severity Basis: Severity based on High impact and affected scope.
Business email compromise remains the top cybercrime loss vector. FBI IC3 2024 reports median BEC losses near $50,000 per incident, with larger enterprises seeing seven-figure fraud exposure.
Attachment sandboxing is disabled, increasing the risk that malware-bearing email reaches end users.
| Email Security Control |
|---|
| Safe Attachments Status |
Get-SafeAttachmentPolicy | Select-Object Name,EnableGet-SafeAttachmentRule | Select-Object Name,State,RecipientDomainIsEnable = True for tenant policy
Program-derived from explicit closure text or the first verification outcome.
Data Source: email_security
Severity Basis: Severity based on High impact and affected scope.
Business email compromise remains the top cybercrime loss vector. FBI IC3 2024 reports median BEC losses near $50,000 per incident, with larger enterprises seeing seven-figure fraud exposure.
Impersonation and targeted phishing defenses are weakened, increasing risk to executives and finance users.
| Email Security Control |
|---|
| Anti-Phishing Status |
Get-AntiPhishPolicy | Select-Object Name,Enabled,EnableTargetedUserProtectionGet-AntiPhishRule | Select-Object Name,State,RecipientDomainIsPolicy enabled with targeted user/domain protection
Program-derived from explicit closure text or the first verification outcome.
Data Source: email_security
Severity Basis: Severity based on High impact and affected scope.
Business email compromise remains the top cybercrime loss vector. FBI IC3 2024 reports median BEC losses near $50,000 per incident, with larger enterprises seeing seven-figure fraud exposure.
A lower containment rate means more malicious email may remain in user mailboxes, increasing business compromise and incident response risk.
| Category | Count |
|---|---|
| Spam | 892 |
| Phishing | 34 |
| Malware | 3 |
| Total | 929 |
Get-MgSecurityAlert -Top 200 | Measure-ObjectGet-MessageTrace -StartDate (Get-Date).AddDays(-30) -EndDate (Get-Date)Containment rate trends to >=95% over the next reporting window
Program-derived from explicit closure text or the first verification outcome.
Data Source: email_security
Severity Basis: Severity based on High impact and affected scope.
Identity compromise enables tenant-wide privilege abuse. Verizon DBIR 2024 reports 53% of breaches involve stolen credentials, and Microsoft reports MFA blocks 99.9% of automated account attacks.
Phishing-resistant authentication is not enabled at the policy layer. This leaves the tenant more exposed to credential theft and MFA fatigue attacks.
| Authentication Methods Policy |
|---|
| FIDO2 method configuration |
Get-MgPolicyAuthenticationMethodPolicyAuthenticationMethodConfiguration | Where-Object {$_.Id -eq 'Fido2'} | Select-Object Id,StateGet-MgReportAuthenticationMethodUserRegistrationDetail -Top 20 | Select-Object userPrincipalName,isPasswordlessCapableState = enabled
Program-derived from explicit closure text or the first verification outcome.
Data Source: authentication_methods_policy.method_configurations
Severity Basis: Severity based on High impact and affected scope.
Detection and response gaps increase dwell time and breach cost. IBM reports organizations with mature detection/response capabilities reduce breach impact by more than $1M compared to low-maturity peers.
Authentication failure and risky sign-in volume is elevated, suggesting active account targeting or policy/user experience gaps that could lead to compromise.
| Alert Pattern | Severity | Count | Top Context | Latest Seen |
|---|---|---|---|---|
| Impossible travel activity | High | 1 | Status: New | Feb 05, 2026 |
| Suspicious inbox forwarding rule created | High | 1 | Status: New | Feb 03, 2026 |
| Email messages containing malicious URL removed after delivery | Medium | 1 | Status: New | Feb 06, 2026 |
Showing top 3 alert patterns from 3 active alerts.
Get-MgAuditLogSignIn -Top 200 | Group-Object Status | Select-Object Name,CountGet-MgIdentityProtectionRiskyUser -Top 50 | Select-Object UserPrincipalName,RiskLevel,RiskStateFailed sign-in count trends downward week-over-week
Program-derived from explicit closure text or the first verification outcome.
Data Source: sign_in_analysis.failed_count
Severity Basis: Severity based on High impact and affected scope.
Identity compromise enables tenant-wide privilege abuse. Verizon DBIR 2024 reports 53% of breaches involve stolen credentials, and Microsoft reports MFA blocks 99.9% of automated account attacks.
| High-Risk Administrative Operation |
|---|
| sarah.chen@contoso.com -> Add member to role |
| michael.torres@contoso.com -> Disable MFA for user |
| sarah.chen@contoso.com -> Consent to application |
Get-MgAuditLogDirectoryAudit -Top 50 | Select-Object ActivityDisplayName,InitiatedBy,TargetResources,ActivityDateTimeGet-MgSecurityAlert -Top 20 | Select-Object Title,Severity,StatusAll high-risk actions map to approved change tickets
Program-derived from explicit closure text or the first verification outcome.
Data Source: high_risk_operations.total_count
Severity Basis: Severity based on High impact and affected scope.
Weak data governance increases breach and regulatory exposure. IBM Cost of a Data Breach 2024 reports a $4.88M global average breach cost, with exfiltration and compliance penalties driving long-tail impact.
| Sharepoint Site With External Sharing |
|---|
| Human Resources |
| Finance and Billing |
| IT Operations |
| Training Portal |
| Marcus Williams |
Showing 5 of 7 total
Get-SPOSite -Limit All | Select-Object Url,SharingCapabilityGet-SPOTenant | Select-Object RequireAnonymousLinksExpireInDaysSensitive sites show SharingCapability = Disabled
Program-derived from explicit closure text or the first verification outcome.
Data Source: sharepoint_sites.sites
Severity Basis: Severity based on High impact and affected scope.
Identity compromise enables tenant-wide privilege abuse. Verizon DBIR 2024 reports 53% of breaches involve stolen credentials, and Microsoft reports MFA blocks 99.9% of automated account attacks.
A large recommendation backlog indicates delayed security hardening and prolonged exposure to known control gaps.
| Recommendation | Priority | Score Impact |
|---|---|---|
| Do Not Allow Users To Grant Consent To Unmanaged Applications | Critical | 9.0 |
| Ensure Sign-In Risk Policy Is Enabled | Critical | 8.5 |
| Ensure User Risk Policy Is Enabled | Critical | 8.5 |
| Windows Print Spooler Elevation Of Privilege | High | 7.8 |
| Windows Ancillary Function Driver For Win Sock Elevation Of Privilege | High | 7.8 |
These are Microsoft Secure Score recommendations, not CVE vulnerabilities.
Get-MgSecuritySecureScoreControlProfile -Top 50 | Select-Object Title,ImplementationStatus,ScoreGet-Content remediation_backlog.csv | Select-Object -First 20Not-started high-value recommendations trend downward each sprint
Program-derived from explicit closure text or the first verification outcome.
Data Source: recommendations.recommendations
Severity Basis: Severity based on High impact and affected scope.
Overprivileged applications can access broad tenant data silently. OAuth app abuse has been used in major cloud intrusions, and unauthorized app consent can bypass traditional endpoint controls.
Several third-party applications hold elevated Microsoft 365 permissions, including apps from unverified publishers. This raises supply-chain and data exfiltration risk.
| Application | Permissions | Consent Type | Risky Perms |
|---|---|---|---|
| DataSync Pro (Unverified) | User.Read.All, Mail.ReadWrite, Files.ReadWrite.All, Directory.Read.All, Sites.FullControl.All | 0 users | 5 |
Showing 1 of 2 total
Get-MgServicePrincipal -All | Select-Object DisplayName,AppOwnerOrganizationIdGet-MgOauth2PermissionGrant -All | Select-Object ClientId,Scope,ConsentTypeOnly approved apps with documented owners remain
Program-derived from explicit closure text or the first verification outcome.
Data Source: third_party_apps.apps
Severity Basis: Severity based on High impact and affected scope.
Identity compromise enables tenant-wide privilege abuse. Verizon DBIR 2024 reports 53% of breaches involve stolen credentials, and Microsoft reports MFA blocks 99.9% of automated account attacks.
A material portion of user accounts is not prepared for strong MFA, increasing susceptibility to phishing and account takeover.
| User Lacking Strong Auth Methods |
|---|
| david.mitchell@contoso.com |
| robert.johnson@contoso.com |
| ana.rodriguez@contoso.com |
| jenny.lee@contoso.com |
Showing 4 of 52 total
Get-MgReportAuthenticationMethodUserRegistrationDetail -Top 200 | Select-Object UserPrincipalName,IsMfaCapable,MethodsRegisteredGet-Content mfa_exceptions.csv | Select-Object -First 20Coverage reaches at least 95% MFA-capable users
Program-derived from explicit closure text or the first verification outcome.
Data Source: user_auth_methods.stats
Severity Basis: Severity based on High impact and affected scope.
Detection and response gaps increase dwell time and breach cost. IBM reports organizations with mature detection/response capabilities reduce breach impact by more than $1M compared to low-maturity peers.
| Alert Pattern | Severity | Count | Top Context | Latest Seen |
|---|---|---|---|---|
| Impossible travel activity | High | 1 | Status: New | Feb 05, 2026 |
| Suspicious inbox forwarding rule created | High | 1 | Status: New | Feb 03, 2026 |
| Email messages containing malicious URL removed after delivery | Medium | 1 | Status: New | Feb 06, 2026 |
Showing top 3 alert patterns from 3 active alerts.
Get-MgSecurityAlert -Top 200 | Group-Object Severity | Select-Object Name,CountGet-Content soc_triage_metrics.csv | Select-Object -First 20High-severity backlog decreases week-over-week
Program-derived from explicit closure text or the first verification outcome.
Data Source: threat_pulse.active_count
Severity Basis: Severity based on High impact and affected scope.
Cloud misconfiguration remains a primary breach driver. Public exposure and weak network controls can enable rapid compromise, outage, and recovery costs that frequently exceed six figures for SMB environments.
| NSG Name | Location | Rules |
|---|---|---|
| nsg-edge-westus2 |
az network nsg list --query '[].{Name:name, RG:resourceGroup}' -o tableaz network nsg rule list --nsg-name <nsg-name> --resource-group <rg> --query '[?direction==`Inbound` && access==`Allow`]'List of NSGs for review
Program-derived from explicit closure text or the first verification outcome.
Data Source: arm_network_nsgs
Severity Basis: Severity based on High impact and affected scope.
Cloud misconfiguration remains a primary breach driver. Public exposure and weak network controls can enable rapid compromise, outage, and recovery costs that frequently exceed six figures for SMB environments.
| Storage Account |
|---|
| stapp01 |
az storage account list --query '[?allowBlobPublicAccess==`true`].{Name:name, RG:resourceGroup}' -o tableNo results (all accounts have public access disabled)
Program-derived from explicit closure text or the first verification outcome.
Data Source: arm_storage_accounts
Severity Basis: Severity based on High impact and affected scope.
Unpatched vulnerabilities compress defender response windows. Mandiant reports critical exploit weaponization often occurs within days to weeks, increasing incident probability and emergency remediation spend.
12 high-priority security configuration gaps detected across the tenant. These represent significant configuration weaknesses that increase the organization's attack surface and should be addressed promptly.
| Control / Recommendation | Priority | Score Impact |
|---|---|---|
| Do Not Allow Users To Grant Consent To Unmanaged Applications | Critical | 10.0 |
| Ensure Sign-In Risk Policy Is Enabled | Critical | 8.0 |
| Ensure User Risk Policy Is Enabled | Critical | 8.0 |
Showing 3 of 12 total
Get-MgSecuritySecureScore -Top 1 | Select-Object CurrentScore, MaxScoreCurrentScore near MaxScore with no critical gaps
Program-derived from explicit closure text or the first verification outcome.
Data Source: vulnerability_data
Severity Basis: Severity based on High impact and affected scope.
Unpatched vulnerabilities compress defender response windows. Mandiant reports critical exploit weaponization often occurs within days to weeks, increasing incident probability and emergency remediation spend.
28 high-severity security vulnerabilities identified. These represent significant configuration gaps that increase the organization's attack surface and should be addressed within 30 days.
| Control / Recommendation | Priority | Affected Assets |
|---|---|---|
| Windows Print Spooler Elevation Of Privilege | High | 12 |
| Windows Ancillary Function Driver For Win Sock Elevation Of Privilege | High | 8 |
Showing 2 of 28 total
Get-MgSecuritySecureScore -Top 1 | Select-Object CurrentScoreScore improved after remediation
Program-derived from explicit closure text or the first verification outcome.
Data Source: vulnerability_data
Severity Basis: Severity based on High impact and affected scope.
Identified spend inefficiencies create direct, recurring waste. Converting these findings into action typically reclaims monthly OPEX immediately and compounds into annual savings with no reduction in security posture.
6 orphaned resources are consuming budget without delivering business value. Current avoidable spend is $1,240/month ($14,880/year).
| Orphaned Cloud Resources |
|---|
| orphaned-managed-disk-fin01 |
| unused-public-ip-westus2 |
| stale-snapshot-hr-archive |
Showing 3 of 6 total
az resource list --tag orphaned=true -o tableNo orphaned resources returned
Program-derived from explicit closure text or the first verification outcome.
Data Source: cost_summary.orphaned_resources
Severity Basis: Severity based on High impact and affected scope.
This finding indicates measurable security and business risk. Delayed remediation increases the likelihood of operational disruption, compliance impact, and avoidable response cost.
| Control | Current State | Evidence |
|---|---|---|
| Privileged Admin Footprint Controlled | 3 Global Admins (target: <=4), but 1 admin without MFA | 3 Global Admins found; admin3@contoso.com lacks MFA registration |
Get-MgReportAuthenticationMethodUserRegistrationDetail | Where-Object {$_.IsAdmin -eq $true -and $_.IsMfaRegistered -eq $false} | Measure-ObjectGet-MgRoleManagementDirectoryRoleAssignmentSchedule -Filter "roleDefinitionId eq '62e90394-69f5-4237-9190-012177145e10'" | Select PrincipalId, MemberType./Invoke-SecurityCollection.ps1 -OutputPath ./resultsCount: 0
Program-derived from explicit closure text or the first verification outcome.
Data Source: onprem_ad_assessment
Severity Basis: Severity based on High impact and affected scope.
This finding indicates measurable security and business risk. Delayed remediation increases the likelihood of operational disruption, compliance impact, and avoidable response cost.
| Control | Current State | Evidence |
|---|---|---|
| LDAP Signing/Channel Binding Gap | LDAP signing not enforced on domain controllers | GPO audit shows LDAPServerIntegrity = 0 (Not Required) on DC-01, DC-02 |
Get-ADDomainController -Filter * | ForEach-Object { Get-ItemProperty "\\$($_.HostName)\HKLM\System\CurrentControlSet\Services\NTDS\Parameters" -Name LDAPServerIntegrity }Get-ItemProperty 'HKLM:\System\CurrentControlSet\Services\NTDS\Parameters' -Name 'LdapEnforceChannelBinding'./Invoke-SecurityCollection.ps1 -OutputPath ./resultsLDAPServerIntegrity: 2 (Require signing) on all DCs
Program-derived from explicit closure text or the first verification outcome.
Data Source: onprem_ad_assessment
Severity Basis: Severity based on High impact and affected scope.
This control gap increases security and operational risk. Resolve promptly to reduce breach likelihood, compliance exposure, and avoidable recovery cost.
| Infrastructure Configuration |
|---|
| RDP is exposed to all networks — primary ransomware entry vector |
Invoke-PolarisCollection -Modules All -OutputPath ./resultsONPREM-FW-003 status: pass
Program-derived from explicit closure text or the first verification outcome.
Data Source: onprem_infra_assessment.findings[ONPREM-FW-003]
Severity Basis: Severity based on High impact and affected scope.
This control gap increases security and operational risk. Resolve promptly to reduce breach likelihood, compliance exposure, and avoidable recovery cost.
| Infrastructure Configuration |
|---|
| Open high-risk ports: 3389 (RDP (remote access exposure)), 445 (SMB (lateral movement, ransomware)), 1433 (SQL Server (d |
Invoke-PolarisCollection -Modules All -OutputPath ./resultsONPREM-NET-001 status: pass
Program-derived from explicit closure text or the first verification outcome.
Data Source: onprem_infra_assessment.findings[ONPREM-NET-001]
Severity Basis: Severity based on High impact and affected scope.
This control gap increases security and operational risk. Resolve promptly to reduce breach likelihood, compliance exposure, and avoidable recovery cost.
| Infrastructure Configuration |
|---|
| System patching is behind — 12 updates pending, last update 45 days ago |
Invoke-PolarisCollection -Modules All -OutputPath ./resultsONPREM-EP-005 status: pass
Program-derived from explicit closure text or the first verification outcome.
Data Source: onprem_infra_assessment.findings[ONPREM-EP-005]
Severity Basis: Severity based on High impact and affected scope.
This control gap increases security and operational risk. Resolve promptly to reduce breach likelihood, compliance exposure, and avoidable recovery cost.
| Infrastructure Configuration |
|---|
| Certificates expiring soon: CN=mail.contoso.local |
Invoke-PolarisCollection -Modules All -OutputPath ./resultsONPREM-CERT-001 status: pass
Program-derived from explicit closure text or the first verification outcome.
Data Source: onprem_infra_assessment.findings[ONPREM-CERT-001]
Severity Basis: Severity based on High impact and affected scope.
This control gap increases security and operational risk. Resolve promptly to reduce breach likelihood, compliance exposure, and avoidable recovery cost.
| Infrastructure Configuration |
|---|
| Domain password policy requires only 8 characters — below CMMC/NIST minimum of 12 |
Invoke-PolarisCollection -Modules All -OutputPath ./resultsONPREM-AD-011 status: pass
Program-derived from explicit closure text or the first verification outcome.
Data Source: onprem_infra_assessment.findings[ONPREM-AD-011]
Severity Basis: Severity based on High impact and affected scope.
Identity compromise enables tenant-wide privilege abuse. Verizon DBIR 2024 reports 53% of breaches involve stolen credentials, and Microsoft reports MFA blocks 99.9% of automated account attacks.
| Security Control |
|---|
| Too Many Global Administrators |
Showing 1 of 7 total
Get-MgReportAuthenticationMethodUserRegistrationDetail -Top 50 | Select-Object userPrincipalName,isMfaRegisteredIdentity-025 meets target baseline (<=5) using privileged_accounts.global_admin_count.
Program-derived from explicit closure text or the first verification outcome.
Data Source: privileged_accounts.global_admin_count
Severity Basis: Severity based on High impact and affected scope.
Identity compromise enables tenant-wide privilege abuse. Verizon DBIR 2024 reports 53% of breaches involve stolen credentials, and Microsoft reports MFA blocks 99.9% of automated account attacks.
| Security Control |
|---|
| PIM Not Utilized for Privileged Roles |
Showing 1 of 12 total
Get-MgReportAuthenticationMethodUserRegistrationDetail -Top 50 | Select-Object userPrincipalName,isMfaRegisteredIdentity-026 meets target baseline (PIM enabled for privileged roles) using privileged_accounts.pim_eligible_count.
Program-derived from explicit closure text or the first verification outcome.
Data Source: privileged_accounts.pim_eligible_count
Severity Basis: Severity based on High impact and affected scope.
Identity compromise enables tenant-wide privilege abuse. Verizon DBIR 2024 reports 53% of breaches involve stolen credentials, and Microsoft reports MFA blocks 99.9% of automated account attacks.
| User | Protocol | Last Sign-in |
|---|---|---|
| david.mitchell@contoso.com | IMAP4 | Feb 11, 2026 21:14 |
| patricia.kowalski@contoso.com | IMAP4 | Feb 12, 2026 07:14 |
| robert.chen@contoso.com | SMTP | Feb 12, 2026 15:14 |
Get-MgReportAuthenticationMethodUserRegistrationDetail -Top 50 | Select-Object userPrincipalName,isMfaRegisteredIdentity-027 meets target baseline (0) using sign_in_analysis.legacy_auth_sign_ins.
Program-derived from explicit closure text or the first verification outcome.
Data Source: sign_in_analysis.legacy_auth_sign_ins
Severity Basis: Severity based on High impact and affected scope.
This finding indicates measurable security and business risk. Delayed remediation increases the likelihood of operational disruption, compliance impact, and avoidable response cost.
| Device |
|---|
| DESKTOP-FIN01 |
Get-MgDeviceManagementManagedDevice -Top 50 | Select-Object DeviceName,ComplianceStateDevice-010 meets target baseline (0) using managed_devices.devices[].is_encrypted.
Program-derived from explicit closure text or the first verification outcome.
Data Source: managed_devices.devices[].is_encrypted
Severity Basis: Severity based on High impact and affected scope.
This finding indicates measurable security and business risk. Delayed remediation increases the likelihood of operational disruption, compliance impact, and avoidable response cost.
| Device | OS | Status | Owner |
|---|---|---|---|
| SRP-PC012 | Windows | Non-compliant | marcus.williams@contoso.com |
| SRP-PC025 | Windows | Non-compliant | james.okafor@contoso.com |
| SRP-PC038 | Windows | Unknown | thomas.bergstrom@contoso.com |
| SRP-PC007 | Windows | Non-compliant | james.liu@contoso.com |
| SRP-PC008 | Windows | Unknown | robert.johnson@contoso.com |
| SRP-MAC007 | macOS | Non-compliant | ana.rodriguez@contoso.com |
Get-MgDeviceManagementManagedDevice -Top 50 | Select-Object DeviceName,ComplianceStateDevice-013 meets target baseline (>=1) using device_compliance_policies.total_count.
Program-derived from explicit closure text or the first verification outcome.
Data Source: device_compliance_policies.total_count
Severity Basis: Severity based on High impact and affected scope.
This finding indicates measurable security and business risk. Delayed remediation increases the likelihood of operational disruption, compliance impact, and avoidable response cost.
| Control / Recommendation | Priority | Affected Assets |
|---|---|---|
| Windows Print Spooler Elevation Of Privilege | High | 12 |
| Windows Ancillary Function Driver For Win Sock Elevation Of Privilege | High | 8 |
Showing 2 of 85 total
Get-MgSecuritySecureScore -Top 1 | Select-Object CurrentScore,MaxScoreDevice-016 meets target baseline (<=20) using vulnerability_data.total_vulnerabilities.
Program-derived from explicit closure text or the first verification outcome.
Data Source: vulnerability_data.total_vulnerabilities
Severity Basis: Severity based on High impact and affected scope.
Weak data governance increases breach and regulatory exposure. IBM Cost of a Data Breach 2024 reports a $4.88M global average breach cost, with exfiltration and compliance penalties driving long-tail impact.
| Dlp Policy Baseline |
|---|
| No DLP Policies Configured |
Get-MgOrganization | Select-Object DisplayName,IdDataProtection-013 meets target baseline (>=1) using dlp_policies.total_policies.
Program-derived from explicit closure text or the first verification outcome.
Data Source: dlp_policies.total_policies
Severity Basis: Severity based on High impact and affected scope.
Weak data governance increases breach and regulatory exposure. IBM Cost of a Data Breach 2024 reports a $4.88M global average breach cost, with exfiltration and compliance penalties driving long-tail impact.
| Application | Permissions | Consent Type | Risky Perms |
|---|---|---|---|
| DataSync Pro (Unverified) | User.Read.All, Mail.ReadWrite, Files.ReadWrite.All, Directory.Read.All, Sites.FullControl.All | 0 users | 5 |
Get-MgOrganization | Select-Object DisplayName,IdDataProtection-017 meets target baseline (0 apps with >10 permissions) using third_party_apps.apps.
Program-derived from explicit closure text or the first verification outcome.
Data Source: third_party_apps.apps
Severity Basis: Severity based on High impact and affected scope.
This finding indicates measurable security and business risk. Delayed remediation increases the likelihood of operational disruption, compliance impact, and avoidable response cost.
| Email Encryption Baseline |
|---|
| Sensitive Email Encryption Not Enabled |
Get-SafeLinksPolicy | Select-Object Name,IsEnabled,EnableForInternalSendersNetwork-013 meets target baseline (enabled) using email_security.email_encryption_enabled.
Program-derived from explicit closure text or the first verification outcome.
Data Source: email_security.email_encryption_enabled
Severity Basis: Severity based on High impact and affected scope.
Business email compromise remains the top cybercrime loss vector. FBI IC3 2024 reports median BEC losses near $50,000 per incident, with larger enterprises seeing seven-figure fraud exposure.
| Security Control |
|---|
| ForwardAll |
Get-SafeLinksPolicy | Select-Object Name,IsEnabled,EnableForInternalSendersEmail-009 meets target baseline (0 external forwarding rules) using exchange_transport_rules.rules.
Program-derived from explicit closure text or the first verification outcome.
Data Source: exchange_transport_rules.rules
Severity Basis: Severity based on High impact and affected scope.
Business email compromise remains the top cybercrime loss vector. FBI IC3 2024 reports median BEC losses near $50,000 per incident, with larger enterprises seeing seven-figure fraud exposure.
| Security Control |
|---|
| No Outbound Spam Policy Enabled |
Get-SafeLinksPolicy | Select-Object Name,IsEnabled,EnableForInternalSendersEmail-012 meets target baseline (enabled) using email_security.outbound_spam_enabled.
Program-derived from explicit closure text or the first verification outcome.
Data Source: email_security.outbound_spam_enabled
Severity Basis: Severity based on High impact and affected scope.
Business email compromise remains the top cybercrime loss vector. FBI IC3 2024 reports median BEC losses near $50,000 per incident, with larger enterprises seeing seven-figure fraud exposure.
| Security Control |
|---|
| BypassSpam |
Get-SafeLinksPolicy | Select-Object Name,IsEnabled,EnableForInternalSendersEmail-013 meets target baseline (0 bypass rules) using exchange_transport_rules.rules.
Program-derived from explicit closure text or the first verification outcome.
Data Source: exchange_transport_rules.rules
Severity Basis: Severity based on High impact and affected scope.
Business email compromise remains the top cybercrime loss vector. FBI IC3 2024 reports median BEC losses near $50,000 per incident, with larger enterprises seeing seven-figure fraud exposure.
| Security Controls |
|---|
| Auto-Forward to External Addresses Detected |
Showing 1 of 2 total
Get-SafeLinksPolicy | Select-Object Name,IsEnabled,EnableForInternalSendersEmail-014 meets target baseline (0 mailbox auto-forward rules to external domains) using email_security.external_forward_count.
Program-derived from explicit closure text or the first verification outcome.
Data Source: email_security.external_forward_count
Severity Basis: Severity based on High impact and affected scope.
Business email compromise remains the top cybercrime loss vector. FBI IC3 2024 reports median BEC losses near $50,000 per incident, with larger enterprises seeing seven-figure fraud exposure.
| Security Control |
|---|
| contoso.com |
Get-SafeLinksPolicy | Select-Object Name,IsEnabled,EnableForInternalSendersEmail-016 meets target baseline (DMARC enabled on all verified domains) using email_security.domains.
Program-derived from explicit closure text or the first verification outcome.
Data Source: email_security.domains
Severity Basis: Severity based on High impact and affected scope.
Non-compliant endpoints materially increase lateral-movement risk. Microsoft security telemetry shows unmanaged or weakly managed devices have materially higher incident rates and recovery costs often exceed $8,000 per endpoint.
| Security Control |
|---|
| DESKTOP-FIN01 |
Get-MgDeviceManagementManagedDevice -Top 50 | Select-Object DeviceName,ComplianceStateEndpoint-007 meets target baseline (100% encryption coverage for managed devices) using managed_devices.devices.
Program-derived from explicit closure text or the first verification outcome.
Data Source: managed_devices.devices
Severity Basis: Severity based on High impact and affected scope.
Non-compliant endpoints materially increase lateral-movement risk. Microsoft security telemetry shows unmanaged or weakly managed devices have materially higher incident rates and recovery costs often exceed $8,000 per endpoint.
| Security Control |
|---|
| Defender Tamper Protection Disabled |
Get-MgDeviceManagementManagedDevice -Top 50 | Select-Object DeviceName,ComplianceStateEndpoint-011 meets target baseline (enabled) using mde_summary.tamper_protection_enabled.
Program-derived from explicit closure text or the first verification outcome.
Data Source: mde_summary.tamper_protection_enabled
Severity Basis: Severity based on High impact and affected scope.
Non-compliant endpoints materially increase lateral-movement risk. Microsoft security telemetry shows unmanaged or weakly managed devices have materially higher incident rates and recovery costs often exceed $8,000 per endpoint.
| Security Control |
|---|
| DESKTOP-FIN01 |
Get-MgDeviceManagementManagedDevice -Top 50 | Select-Object DeviceName,ComplianceStateEndpoint-013 meets target baseline (0 unsupported operating systems) using managed_devices.devices.
Program-derived from explicit closure text or the first verification outcome.
Data Source: managed_devices.devices
Severity Basis: Severity based on High impact and affected scope.
Identity compromise enables tenant-wide privilege abuse. Verizon DBIR 2024 reports 53% of breaches involve stolen credentials, and Microsoft reports MFA blocks 99.9% of automated account attacks.
| Security Controls |
|---|
| Privileged Identity Management Not Protecting Admin Roles |
Showing 1 of 12 total
Get-MgReportAuthenticationMethodUserRegistrationDetail -Top 50 | Select-Object userPrincipalName,isMfaRegisteredIdentity-018 meets target baseline (Privileged roles protected with PIM eligibility and just-in-time activation) using privileged_accounts.pim_eligible_count.
Program-derived from explicit closure text or the first verification outcome.
Data Source: privileged_accounts.pim_eligible_count
Severity Basis: Severity based on High impact and affected scope.
Identity compromise enables tenant-wide privilege abuse. Verizon DBIR 2024 reports 53% of breaches involve stolen credentials, and Microsoft reports MFA blocks 99.9% of automated account attacks.
| Security Controls |
|---|
| Risky Sign-Ins Not Investigated |
Showing 1 of 4 total
Get-MgReportAuthenticationMethodUserRegistrationDetail -Top 50 | Select-Object userPrincipalName,isMfaRegisteredIdentity-020 meets target baseline (0 unresolved risky sign-ins) using risky_sign_ins.unresolved_count.
Program-derived from explicit closure text or the first verification outcome.
Data Source: risky_sign_ins.unresolved_count
Severity Basis: Severity based on High impact and affected scope.
Identity compromise enables tenant-wide privilege abuse. Verizon DBIR 2024 reports 53% of breaches involve stolen credentials, and Microsoft reports MFA blocks 99.9% of automated account attacks.
| Security Control |
|---|
| Emergency Access Accounts Not Ready for Lockout Recovery |
Get-MgReportAuthenticationMethodUserRegistrationDetail -Top 50 | Select-Object userPrincipalName,isMfaRegisteredIdentity-021 meets target baseline (At least 2 monitored emergency access accounts) using privileged_accounts.break_glass_accounts.
Program-derived from explicit closure text or the first verification outcome.
Data Source: privileged_accounts.break_glass_accounts
Severity Basis: Severity based on High impact and affected scope.
Cloud misconfiguration remains a primary breach driver. Public exposure and weak network controls can enable rapid compromise, outage, and recovery costs that frequently exceed six figures for SMB environments.
| Security Control |
|---|
| No Effective Network Segmentation Detected |
az graph query -q "Resources | summarize count() by type | order by count_ desc" -o tableInfrastructure-010 meets target baseline (Segmented NSG architecture by workload trust boundary) using arm_network_nsgs.total_nsgs.
Program-derived from explicit closure text or the first verification outcome.
Data Source: arm_network_nsgs.total_nsgs
Severity Basis: Severity based on High impact and affected scope.
Cloud misconfiguration remains a primary breach driver. Public exposure and weak network controls can enable rapid compromise, outage, and recovery costs that frequently exceed six figures for SMB environments.
| Account Name | HTTPS Only | Public Access |
|---|---|---|
| stapp01 | Disabled | Disabled |
az graph query -q "Resources | summarize count() by type | order by count_ desc" -o tableInfrastructure-011 meets target baseline (HTTPS-only enforced on all storage accounts) using arm_storage_accounts.http_enabled_count.
Program-derived from explicit closure text or the first verification outcome.
Data Source: arm_storage_accounts.http_enabled_count
Severity Basis: Severity based on High impact and affected scope.
Cloud misconfiguration remains a primary breach driver. Public exposure and weak network controls can enable rapid compromise, outage, and recovery costs that frequently exceed six figures for SMB environments.
| Security Control |
|---|
| Anonymous Storage Access Enabled |
az graph query -q "Resources | summarize count() by type | order by count_ desc" -o tableInfrastructure-015 meets target baseline (0 storage accounts with anonymous blob access) using arm_storage_accounts.anonymous_access_count.
Program-derived from explicit closure text or the first verification outcome.
Data Source: arm_storage_accounts.anonymous_access_count
Severity Basis: Severity based on High impact and affected scope.
Cloud misconfiguration remains a primary breach driver. Public exposure and weak network controls can enable rapid compromise, outage, and recovery costs that frequently exceed six figures for SMB environments.
| Security Control |
|---|
| Key Vault Recovery Protections Disabled |
az graph query -q "Resources | summarize count() by type | order by count_ desc" -o tableInfrastructure-016 meets target baseline (Soft-delete + purge protection enabled on all key vaults) using arm_key_vaults.soft_delete_disabled_count.
Program-derived from explicit closure text or the first verification outcome.
Data Source: arm_key_vaults.soft_delete_disabled_count
Severity Basis: Severity based on High impact and affected scope.
This finding indicates measurable security and business risk. Delayed remediation increases the likelihood of operational disruption, compliance impact, and avoidable response cost.
| Recommendation | Priority | Score Impact |
|---|---|---|
| Do Not Allow Users To Grant Consent To Unmanaged Applications | Critical | 9.0 |
| Ensure Sign-In Risk Policy Is Enabled | Critical | 8.5 |
| Ensure User Risk Policy Is Enabled | Critical | 8.5 |
| Windows Print Spooler Elevation Of Privilege | High | 7.8 |
| Windows Ancillary Function Driver For Win Sock Elevation Of Privilege | High | 7.8 |
These are Microsoft Secure Score recommendations, not CVE vulnerabilities.
Get-MgSecuritySecureScore -Top 1 | Select-Object CurrentScore,MaxScoreCloudPosture-001 meets target baseline (>= 65%) using secure_score.score_percent.
Program-derived from explicit closure text or the first verification outcome.
Data Source: secure_score.score_percent
Severity Basis: Severity based on High impact and affected scope.
This finding indicates measurable security and business risk. Delayed remediation increases the likelihood of operational disruption, compliance impact, and avoidable response cost.
| Security Control |
|---|
| Incident Response Plan Not Documented |
Get-MgSecurityAlert -Top 50 | Select-Object Severity,Status,CreatedDateTimeResilience-001 meets target baseline (Documented and approved incident response plan) using resilience.incident_response_plan_documented.
Program-derived from explicit closure text or the first verification outcome.
Data Source: resilience.incident_response_plan_documented
Severity Basis: Severity based on High impact and affected scope.
This finding indicates measurable security and business risk. Delayed remediation increases the likelihood of operational disruption, compliance impact, and avoidable response cost.
| Action | Priority |
|---|---|
| Deploy Microsoft Sentinel workspace | Required |
| Connect Azure AD sign-in and audit logs | Required |
| Connect Microsoft 365 audit logs | Required |
| Configure alert rules for critical events | Required |
| Set up automated incident response playbooks | Recommended |
Without SIEM, security events are not centrally monitored.
Get-MgSecurityAlert -Top 50 | Select-Object Severity,Status,CreatedDateTimeResilience-002 meets target baseline (SIEM/Sentinel connected and ingesting security telemetry) using log_analytics_summary.sentinel_connected.
Program-derived from explicit closure text or the first verification outcome.
Data Source: log_analytics_summary.sentinel_connected
Severity Basis: Severity based on High impact and affected scope.
CMMC practice AC.L2-3.1.6 (Non-Privileged Account Use) in the Access Control domain is fail. This control carries a SPRS weight of -3 points. Non-compliance with this practice will reduce your SPRS score and may block CMMC Level 2 certification.
| Remediation Action | Priority |
|---|---|
| Audit non-privileged account usage: ensure daily operations use standard accounts, not admin accounts | Required |
| Create separate admin accounts (e.g., adm-username@) for each IT staff member | Required |
| Configure Conditional Access to require compliant device + MFA for admin account sign-in | Required |
| Block admin accounts from accessing email, Teams, and other productivity workloads | Required |
| Implement privileged access workstations (PAWs) for administrative tasks | Required |
Assessment: Assessed via Manual Questionnaire
Get-MgAuditLogSignIn -Filter "userPrincipalName startswith 'adm-'" | Select AppDisplayName | Group-Object AppDisplayNameVerification evidence confirms the control is implemented.
Program-derived from explicit closure text or the first verification outcome.
Data Source: CMMC Evidence Assessment (Manual Questionnaire)
Severity Basis: Severity high based on SPRS weight (-3) and CMMC certification impact.
CMMC practice IA.L2-3.5.3 (Multifactor Authentication) in the Identification and Authentication domain is fail. This control carries a SPRS weight of -5 points. Non-compliance with this practice will reduce your SPRS score and may block CMMC Level 2 certification.
| Remediation Action | Priority |
|---|---|
| Enable MFA for all users via Conditional Access -- Entra ID > Protection > Conditional Access > + New policy -- All users required to use MFA | Required |
| Configure phishing-resistant MFA for privileged accounts -- Entra ID > Protection > Conditional Access > + New policy (with authentication strength) -- Admins required to use FIDO2 or Windows Hello for Business | Required |
| Block legacy authentication (doesn't support MFA) -- Entra ID > Protection > Conditional Access > + New policy -- Legacy protocols blocked | Required |
| Review and complete MFA registration for all users -- Entra ID > Users > Per-user MFA > Multi-factor authentication -- All users have at least one MFA method registered | Required |
| Deploy FIDO2 security keys to privileged users -- Entra ID > Security > Authentication methods > FIDO2 security key -- FIDO2 keys distributed and registered for admins | Required |
| Configure MFA registration campaign -- Entra ID > Protection > Authentication methods > Registration campaign -- Users prompted to register additional MFA methods | Required |
| Monitor MFA usage and gaps -- Entra ID > Monitoring > Sign-in logs > Filter: MFA requirement -- Dashboard showing MFA adoption and any bypasses | Required |
Assessment: Assessed via Manual Questionnaire
Query control evidence and capture the result: Sign in as standard userQuery control evidence and capture the result: Sign in as admin userQuery Entra sign-in logs and authentication reports for the validation scenario: Attempt legacy auth connectionQuery Entra sign-in logs and authentication reports for the validation scenario: Review MFA registration reportMFA prompt appears before access granted
Program-derived from explicit closure text or the first verification outcome.
Data Source: CMMC Evidence Assessment (Manual Questionnaire)
Severity Basis: Severity high based on SPRS weight (-5) and CMMC certification impact.
CMMC practice AU.L2-3.3.4 (Audit Failure Alerting) in the Audit and Accountability domain is fail. This control carries a SPRS weight of -3 points. Non-compliance with this practice will reduce your SPRS score and may block CMMC Level 2 certification.
| Remediation Action | Priority |
|---|---|
| Enable advanced auditing in Microsoft 365: Set-AdminAuditLogConfig -UnifiedAuditLogIngestionEnabled $true | Required |
| Configure audit log alerts for security events: failed sign-ins, privilege escalation, bulk operations | Required |
| Deploy Microsoft Sentinel or forward audit logs to an existing SIEM for centralized analysis | Required |
| Create detection rules for anomalous behavior patterns (impossible travel, mass downloads, rule creation) | Required |
| Establish a weekly audit log review process with documented findings and actions taken | Required |
Assessment: Assessed via Manual Questionnaire
Get-ProtectionAlert | Select Name, Severity, IsEnabledVerification evidence confirms the control is implemented.
Program-derived from explicit closure text or the first verification outcome.
Data Source: CMMC Evidence Assessment (Manual Questionnaire)
Severity Basis: Severity high based on SPRS weight (-3) and CMMC certification impact.
CMMC practice IR.L2-3.6.1 (Incident Handling) in the Incident Response domain is partial. This control carries a SPRS weight of -5 points. Non-compliance with this practice will reduce your SPRS score and may block CMMC Level 2 certification.
| Remediation Action | Priority |
|---|---|
| Document incident response plan -- Create IRP document -- Written IRP with phases: Preparation, Detection, Analysis, Containment, Eradication, Recovery, Lessons Learned | Required |
| Define incident severity levels and escalation paths -- Document in IRP -- Severity matrix (Critical/High/Medium/Low) with response timeframes and escalation contacts | Required |
| Enable Microsoft Sentinel for detection -- Azure Portal > Microsoft Sentinel > + Create -- Sentinel workspace connected with Azure AD and M365 data connectors | Required |
| Deploy Sentinel analytics rules for detection -- Microsoft Sentinel > Analytics > + Create > Scheduled query rule -- Detection rules active for common attack patterns | Required |
| Create incident response playbooks -- Microsoft Sentinel > Automation > + Create > Playbook -- Automated playbooks for common incident types (phishing, malware, compromised account) | Required |
| Establish communication protocols -- Document in IRP -- Communication plan including: internal notifications, external reporting (DoD within 72 hours), customer notification procedures | Required |
| Conduct tabletop exercise -- Schedule and execute -- Annual tabletop exercise completed with documented lessons learned | Required |
Assessment: Assessed via Manual Questionnaire
Query Sentinel or SIEM alerts for the validation scenario: Trigger test security alertQuery incident records and run the documented playbook checkpoint: Walk through IRP with incident respondersQuery Sentinel or SIEM alerts for the validation scenario: Review Sentinel incident queueAlert appears in Sentinel, incident created per playbook
Program-derived from explicit closure text or the first verification outcome.
Data Source: CMMC Evidence Assessment (Manual Questionnaire)
Severity Basis: Severity high based on SPRS weight (-5) and CMMC certification impact.
Authentication failures for Edinburgh users referencing newly-created CORP objects. Secondary: stale group membership used in ACL evaluations for 5+ hours.
repadmin /showrepl EDI-DC01 /csvCommand returns the expected value above.
Program-derived from explicit closure text or the first verification outcome.
Backup vendor principal can rewrite ACLs on every member of Domain Admins, Enterprise Admins, and Schema Admins.
(Get-Acl 'AD:CN=AdminSDHolder,CN=System,DC=corp,DC=contoso,DC=local').AccessCommand returns the expected value above.
Program-derived from explicit closure text or the first verification outcome.
Tier-0 credentials remain harvestable via NTLM relay, cached credentials on lower-tier hosts, and unconstrained delegation.
Get-ADGroupMember 'Protected Users' | Measure-Object | Select CountCommand returns the expected value above.
Program-derived from explicit closure text or the first verification outcome.
12-character passwords are within reach of offline cracking after a successful DCSync or ntds.dit exfiltration, particularly for service accounts and local admins.
Get-ADFineGrainedPasswordPolicy -Filter *Command returns the expected value above.
Program-derived from explicit closure text or the first verification outcome.
An authenticated adversary can request TGS tickets for these accounts and crack them offline, then pivot with the cleartext service-account password — often into SQL, SharePoint, or Exchange-backed data stores.
Get-ADUser -Filter {ServicePrincipalName -like '*'} -Properties ServicePrincipalName,PasswordLastSetCommand returns the expected value above.
Program-derived from explicit closure text or the first verification outcome.
No authentication is required to request the AS-REP, so this is an external-adjacent attack if the DC is reachable from any partner or vendor segment.
Get-ADUser svc_legacy_ctip_connector -Properties DoesNotRequirePreAuthCommand returns the expected value above.
Program-derived from explicit closure text or the first verification outcome.
MES controller account compromise pivots directly into defense-manufacturing OT network segment.
Get-ADUser svc_mes_ctl -Properties DoesNotRequirePreAuthCommand returns the expected value above.
Program-derived from explicit closure text or the first verification outcome.
Vendor principal can rewrite template ACLs or flags to create a domain-wide certificate-issuance privilege escalation.
Get-Acl 'AD:CN=ContoWorkstationAuth,CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=corp,DC=contoso,DC=local'Command returns the expected value above.
Program-derived from explicit closure text or the first verification outcome.
Imminent service outage — 802.1X/EAP-TLS Wi-Fi, VPN, RDP cert auth, internal HTTPS all fail when the intermediate expires.
certutil -ca.cert c:\ca.crt && openssl x509 -in c:\ca.crt -noout -enddateCommand returns the expected value above.
Program-derived from explicit closure text or the first verification outcome.
Ransomware worm families (WannaCry, EternalBlue, older Petya variants) propagate via SMBv1 — 47-host foothold can become a domain-wide incident within hours.
Get-SmbServerConfiguration | Select EnableSMB1ProtocolCommand returns the expected value above.
Program-derived from explicit closure text or the first verification outcome.
Credential material in simple-bind LDAP traffic can be intercepted and tampered with on the wire.
Get-ItemProperty 'HKLM:\System\CurrentControlSet\Services\NTDS\Parameters' LDAPServerIntegrityCommand returns the expected value above.
Program-derived from explicit closure text or the first verification outcome.
Identity compromise enables tenant-wide privilege abuse. Verizon DBIR 2024 reports 53% of breaches involve stolen credentials, and Microsoft reports MFA blocks 99.9% of automated account attacks.
| User | Protocol | Last Sign-in |
|---|---|---|
| david.mitchell@contoso.com | IMAP4 | Feb 11, 2026 21:14 |
| patricia.kowalski@contoso.com | IMAP4 | Feb 12, 2026 07:14 |
| robert.chen@contoso.com | SMTP | Feb 12, 2026 15:14 |
Get-MgAuditLogSignIn -Filter "clientAppUsed eq 'Exchange ActiveSync' or clientAppUsed eq 'IMAP4' or clientAppUsed eq 'POP3'" -Top 100 | Group-Object UserPrincipalName | Select Name, Count | Sort-Object Count -DescendingNo results after remediation
Program-derived from explicit closure text or the first verification outcome.
Data Source: legacy_auth_users.unique_users
Severity Basis: Severity based on Medium impact and affected scope.
Identity compromise enables tenant-wide privilege abuse. Verizon DBIR 2024 reports 53% of breaches involve stolen credentials, and Microsoft reports MFA blocks 99.9% of automated account attacks.
| Account | Roles | MFA Status | Last sign-in |
|---|---|---|---|
| admin.breakglass@contoso.com | Global Admin | Registered | 2025-06-20 11:00:00+00:00 |
| david.mitchell@contoso.com | Security Admin | Registered | 2026-02-07 08:30:00+00:00 |
| emily.rodriguez@contoso.com | SharePoint Admin | Registered | 2026-02-05 13:20:00+00:00 |
| kevin.patel@contoso.com | Helpdesk Admin | Registered | 2026-02-07 10:00:00+00:00 |
| michael.torres@contoso.com | Global Admin, User Admin | Registered | 2026-02-07 09:15:00+00:00 |
| rachel.kim@contoso.com | Exchange Admin | Registered | 2026-02-06 16:45:00+00:00 |
| sarah.chen@contoso.com | Global Admin | Registered | 2026-02-07 14:30:00+00:00 |
Get-MgDirectoryRoleMember -DirectoryRoleId (Get-MgDirectoryRole -Filter "displayName eq 'Global Administrator'").Id | Measure-Object | Select CountGet-MgDirectoryRoleMember -DirectoryRoleId (Get-MgDirectoryRole -Filter "displayName eq 'Global Administrator'").Id | Select AdditionalPropertiesCount <= 4
Program-derived from explicit closure text or the first verification outcome.
Data Source: privileged_accounts.global_admin_count
Severity Basis: Severity based on Medium impact and affected scope.
Detection and response gaps increase dwell time and breach cost. IBM reports organizations with mature detection/response capabilities reduce breach impact by more than $1M compared to low-maturity peers.
| Action | Priority |
|---|---|
| Deploy Microsoft Sentinel workspace | Required |
| Connect Azure AD sign-in and audit logs | Required |
| Connect Microsoft 365 audit logs | Required |
| Configure alert rules for critical events | Required |
| Set up automated incident response playbooks | Recommended |
Without SIEM, security events are not centrally monitored.
Azure Portal → Microsoft Sentinel → Overview → Verify workspace connectedAzure Portal → Sentinel → Data connectors → Filter: ConnectedSentinel shows active workspace with data connectors
Program-derived from explicit closure text or the first verification outcome.
Data Source: log_analytics_summary.sentinel_configured
Severity Basis: Severity based on Medium impact and affected scope.
Overprivileged applications can access broad tenant data silently. OAuth app abuse has been used in major cloud intrusions, and unauthorized app consent can bypass traditional endpoint controls.
2 third-party applications have been granted broad permissions to access email, files, or directory data. Compromised or malicious apps can use these permissions to exfiltrate sensitive data, send phishing emails from user accounts, or persist access even after password resets. OAuth abuse is increasingly used in supply chain attacks.
| Application | Permissions | Consent Type | Risky Perms |
|---|---|---|---|
| DataSync Pro (Unverified) | User.Read.All, Mail.ReadWrite, Files.ReadWrite.All, Directory.Read.All, Sites.FullControl.All | 0 users | 5 |
Showing 1 of 2 total
Get-MgOauth2PermissionGrant | Where-Object {$_.Scope -match 'Mail|Files|Directory'} | Select ResourceId, Scope, ConsentTypeGet-MgPolicyAuthorizationPolicy | Select -ExpandProperty DefaultUserRolePermissions | Select AllowedToCreateApps, PermissionGrantPoliciesAssignedOnly approved apps with documented business justification
Program-derived from explicit closure text or the first verification outcome.
Data Source: third_party_apps.apps
Severity Basis: Severity based on Medium impact and affected scope.
Identity compromise enables tenant-wide privilege abuse. Verizon DBIR 2024 reports 53% of breaches involve stolen credentials, and Microsoft reports MFA blocks 99.9% of automated account attacks.
| Service Principal | High-Risk Permissions | Risk Level |
|---|---|---|
| DataSync Pro (Unverified) | User.Read.All, Mail.ReadWrite, Files.ReadWrite.All | High |
Get-MgServicePrincipal -All | ForEach-Object { Get-MgServicePrincipalAppRoleAssignment -ServicePrincipalId $_.Id } | Where-Object { $_.AppRoleId -eq '19dbc75e-c2e2-444c-a770-ec69d8559fc7' }Only documented, approved apps
Program-derived from explicit closure text or the first verification outcome.
Data Source: sp_audit.high_privilege_count
Severity Basis: Severity based on Medium impact and affected scope.
Identity compromise enables tenant-wide privilege abuse. Verizon DBIR 2024 reports 53% of breaches involve stolen credentials, and Microsoft reports MFA blocks 99.9% of automated account attacks.
Your tenant has 30 guest (external) accounts, representing 20.0% of all users. Without regular access reviews, stale guest accounts become a persistent attack surface — former partners and vendors retain access to shared resources.
| Name | UPN | Domain | Last sign-in |
|---|---|---|---|
| Amanda Foster | amanda.foster_clientcorp.example.com#EXT#@contoso.onmicrosoft.com | clientcorp.example.com | Not collected |
| Robert Hayes | robert.hayes_partnerfirm.example.com#EXT#@contoso.onmicrosoft.com | partnerfirm.example.com | Not collected |
| Diana Petrova | diana.petrova_outsideaudit.example.com#EXT#@contoso.onmicrosoft.com | outsideaudit.example.com | Not collected |
| Carlos Mendez | carlos.mendez_vendorservices.example.com#EXT#@contoso.onmicrosoft.com | vendorservices.example.com | Not collected |
| stale-contractor | old.contractor_defunct-company.example.com#EXT#@contoso.onmicrosoft.com | defunct-company.example.com | Not collected |
Showing 5 of 30 total | Sign-in context not collected (requires signInActivity access with AuditLog.Read.All) | Sign-in context based on 5 collected guest records
Get-MgUser -Filter "userType eq 'Guest'" -Property DisplayName,SignInActivity | Select DisplayName,@{N='LastSignIn';E={$_.SignInActivity.LastSignInDateTime}}Get-MgIdentityGovernanceAccessReviewDefinition | Where-Object {$_.Scope.Query -like '*Guest*'}All guests have recent sign-in or are removed
Program-derived from explicit closure text or the first verification outcome.
Data Source: guest_users
Severity Basis: Severity based on Medium impact and affected scope.
Identity compromise enables tenant-wide privilege abuse. Verizon DBIR 2024 reports 53% of breaches involve stolen credentials, and Microsoft reports MFA blocks 99.9% of automated account attacks.
Conditional Access location context is limited, reducing the ability to make precise risk-based access decisions and increasing false positives/false negatives.
Get-MgIdentityConditionalAccessNamedLocation | Select-Object DisplayName,IdGet-MgIdentityConditionalAccessPolicy | Select-Object DisplayName,ConditionsAt least three trusted named locations are present
Program-derived from explicit closure text or the first verification outcome.
Data Source: named_locations.locations
Severity Basis: Severity based on Medium impact and affected scope.
Identity compromise enables tenant-wide privilege abuse. Verizon DBIR 2024 reports 53% of breaches involve stolen credentials, and Microsoft reports MFA blocks 99.9% of automated account attacks.
Routine password expiration remains configured on the default domain. Frequent rotation can drive weaker password behavior without materially improving security.
| Default Domain Password Policy |
|---|
| contoso.com |
Get-MgDomain -All | Select-Object Id,IsDefault,PasswordValidityPeriodInDaysGet-MgReportAuthenticationMethodUserRegistrationDetail -Top 50 | Measure-ObjectDefault domain shows PasswordValidityPeriodInDays = 2147483647
Program-derived from explicit closure text or the first verification outcome.
Data Source: password_policies.domains
Severity Basis: Severity based on Medium impact and affected scope.
Overprivileged applications can access broad tenant data silently. OAuth app abuse has been used in major cloud intrusions, and unauthorized app consent can bypass traditional endpoint controls.
External guests are active in Teams collaboration spaces. Without periodic review, guest access can persist beyond business need and expose sensitive discussions or files.
| Name | UPN | Domain | Last sign-in |
|---|---|---|---|
| Amanda Foster | amanda.foster_clientcorp.example.com#EXT#@contoso.onmicrosoft.com | clientcorp.example.com | Not collected |
| Robert Hayes | robert.hayes_partnerfirm.example.com#EXT#@contoso.onmicrosoft.com | partnerfirm.example.com | Not collected |
| Diana Petrova | diana.petrova_outsideaudit.example.com#EXT#@contoso.onmicrosoft.com | outsideaudit.example.com | Not collected |
| Carlos Mendez | carlos.mendez_vendorservices.example.com#EXT#@contoso.onmicrosoft.com | vendorservices.example.com | Not collected |
| stale-contractor | old.contractor_defunct-company.example.com#EXT#@contoso.onmicrosoft.com | defunct-company.example.com | Not collected |
Sign-in context not collected (requires signInActivity access with AuditLog.Read.All)
Get-Team | ForEach-Object {Get-TeamUser -GroupId $_.GroupId -Role Guest}Get-MgIdentityGovernanceAccessReviewDefinition -All | Select-Object DisplayName,StatusGuest access is limited to approved teams only
Program-derived from explicit closure text or the first verification outcome.
Data Source: teams_summary.teams
Severity Basis: Severity based on Medium impact and affected scope.
Non-compliant endpoints materially increase lateral-movement risk. Microsoft security telemetry shows unmanaged or weakly managed devices have materially higher incident rates and recovery costs often exceed $8,000 per endpoint.
Get-MgDeviceManagementDeviceConfiguration -All | Select-Object DisplayName,IdGet-MgDeviceManagementDeviceConfigurationAssignment -AllBaseline policy set expands to at least three profiles
Program-derived from explicit closure text or the first verification outcome.
Data Source: device_configuration_policies.total_count
Severity Basis: Severity based on Medium impact and affected scope.
Non-compliant endpoints materially increase lateral-movement risk. Microsoft security telemetry shows unmanaged or weakly managed devices have materially higher incident rates and recovery costs often exceed $8,000 per endpoint.
| Device | OS | Status | Owner |
|---|---|---|---|
| SRP-PC012 | Windows | Non-compliant | marcus.williams@contoso.com |
| SRP-PC025 | Windows | Non-compliant | james.okafor@contoso.com |
| SRP-PC038 | Windows | Unknown | thomas.bergstrom@contoso.com |
| SRP-PC007 | Windows | Non-compliant | james.liu@contoso.com |
| SRP-PC008 | Windows | Unknown | robert.johnson@contoso.com |
| SRP-MAC007 | macOS | Non-compliant | ana.rodriguez@contoso.com |
Get-MgDeviceManagementDeviceCompliancePolicy -All | Select-Object DisplayName,IdGet-MgDeviceManagementDeviceCompliancePolicyAssignment -AllAll required platform policies are present
Program-derived from explicit closure text or the first verification outcome.
Data Source: device_compliance_policies.total_count
Severity Basis: Severity based on Medium impact and affected scope.
Weak data governance increases breach and regulatory exposure. IBM Cost of a Data Breach 2024 reports a $4.88M global average breach cost, with exfiltration and compliance penalties driving long-tail impact.
Retention configuration exists but does not appear comprehensive across core workloads, which increases legal/compliance exposure and inconsistent data lifecycle handling.
| Retention Policy |
|---|
| Default Retention |
Get-RetentionCompliancePolicy | Select-Object Name,Enabled,ExchangeLocation,SharePointLocation,OneDriveLocation,TeamsChatLocationGet-RetentionCompliancePolicy | Where-Object {$_.Enabled -eq $true}Core workloads show explicit retention coverage
Program-derived from explicit closure text or the first verification outcome.
Data Source: retention_policies.total_policies
Severity Basis: Severity based on Medium impact and affected scope.
Cloud misconfiguration remains a primary breach driver. Public exposure and weak network controls can enable rapid compromise, outage, and recovery costs that frequently exceed six figures for SMB environments.
| Name | IP Address | Associated Resource |
|---|---|---|
| Unknown | 52.160.14.27 | Unassociated |
| Unknown | 20.45.71.11 | vm-finance-jumpbox |
az network public-ip list --query '[].{Name:name, IP:ipAddress, Associated:ipConfiguration.id}' -o tableNo orphaned IPs, no direct VM attachments
Program-derived from explicit closure text or the first verification outcome.
Data Source: arm_public_ips
Severity Basis: Severity based on Medium impact and affected scope.
Unpatched vulnerabilities compress defender response windows. Mandiant reports critical exploit weaponization often occurs within days to weeks, increasing incident probability and emergency remediation spend.
30 medium-severity security vulnerabilities identified. These represent configuration improvements that would strengthen the overall security posture and should be addressed within 90 days.
| Security Controls | Details |
|---|---|
| 30 security controls | 30 medium-severity vulnerabilities |
Get-MgSecuritySecureScore -Top 1 | Select-Object CurrentScoreScore improved after remediation
Program-derived from explicit closure text or the first verification outcome.
Data Source: vulnerability_data
Severity Basis: Severity based on Medium impact and affected scope.
Identified spend inefficiencies create direct, recurring waste. Converting these findings into action typically reclaims monthly OPEX immediately and compounds into annual savings with no reduction in security posture.
32 license seats are unassigned while still billed, creating recurring waste of $135/month ($1,620/year).
| Unused License Seats |
|---|
| Microsoft 365 Business Premium: 5 unused |
| Microsoft Defender for Office 365 Plan 2: 5 unused |
| Microsoft 365 E5: 22 unused |
Showing 3 of 32 total
Get-MgSubscribedSku | Select SkuPartNumber, ConsumedUnits, PrepaidUnitsPurchased seats closely match consumed seats by SKU
Program-derived from explicit closure text or the first verification outcome.
Data Source: license_compliance.by_type
Severity Basis: Severity based on Medium impact and affected scope.
Identified spend inefficiencies create direct, recurring waste. Converting these findings into action typically reclaims monthly OPEX immediately and compounds into annual savings with no reduction in security posture.
Unimplemented Azure Advisor actions represent $1,850/month ($22,200/year) in potential savings.
| Cost Optimization Recommendations |
|---|
| Azure Advisor cost recommendations pending implementation |
Showing 1 of 7 total
az advisor recommendation list --category Cost -o tableRecommendation backlog reduced and savings realized
Program-derived from explicit closure text or the first verification outcome.
Data Source: cost_summary.advisor_savings
Severity Basis: Severity based on Medium impact and affected scope.
Identified spend inefficiencies create direct, recurring waste. Converting these findings into action typically reclaims monthly OPEX immediately and compounds into annual savings with no reduction in security posture.
4 virtual machines appear over-provisioned. Rightsizing opportunity is $960/month ($11,520/year).
| Oversized Virtual Machines |
|---|
| vm-finance-etl-01 |
| vm-reporting-api-02 |
| vm-legacy-print-01 |
Showing 3 of 4 total
az vm list -d --query "[].{name:name,size:hardwareProfile.vmSize}" -o tableFlagged VMs resized to target SKUs without performance regressions
Program-derived from explicit closure text or the first verification outcome.
Data Source: cost_summary.oversized_vms
Severity Basis: Severity based on Medium impact and affected scope.
Identified spend inefficiencies create direct, recurring waste. Converting these findings into action typically reclaims monthly OPEX immediately and compounds into annual savings with no reduction in security posture.
No cost budget alerts are configured, increasing the likelihood of late detection for spend overruns. Unmonitored monthly run-rate exposure: $28,750/month ($345,000/year).
| Subscription Budget Control Gap |
|---|
| No active budget thresholds or notifications |
az consumption budget list --subscription <subscription-id> -o tableBudgets present with active threshold notifications
Program-derived from explicit closure text or the first verification outcome.
Data Source: cost_summary.budget_alerts
Severity Basis: Severity based on Medium impact and affected scope.
Identified spend inefficiencies create direct, recurring waste. Converting these findings into action typically reclaims monthly OPEX immediately and compounds into annual savings with no reduction in security posture.
30 users are operating without licenses while consuming tenant resources. Estimated commercial exposure is $783/month ($9,401/year).
| Unlicensed Users |
|---|
| Unlicensed user inventory available in license compliance report |
Showing 1 of 30 total
Get-MgUser -All | Where-Object {$_.AssignedLicenses.Count -eq 0} | Measure-ObjectUnlicensed users reduced below 15% threshold with approved exceptions
Program-derived from explicit closure text or the first verification outcome.
Data Source: license_compliance.unlicensed_users
Severity Basis: Severity based on Medium impact and affected scope.
Identified spend inefficiencies create direct, recurring waste. Converting these findings into action typically reclaims monthly OPEX immediately and compounds into annual savings with no reduction in security posture.
Premium SKU assignment coverage is below target and represents avoidable spend of $1,254/month ($15,048/year).
| Premium Sku With Low Utilization |
|---|
| Microsoft 365 E5: 18/40 assigned |
Get-MgSubscribedSku | Select SkuPartNumber,ConsumedUnits,PrepaidUnitsPremium SKU utilization trends above 70% with documented exceptions
Program-derived from explicit closure text or the first verification outcome.
Data Source: license_compliance.by_type
Severity Basis: Severity based on Medium impact and affected scope.
This finding indicates measurable security and business risk. Delayed remediation increases the likelihood of operational disruption, compliance impact, and avoidable response cost.
| User | Protocol | Last Sign-in |
|---|---|---|
| david.mitchell@contoso.com | IMAP4 | Feb 11, 2026 21:14 |
| patricia.kowalski@contoso.com | IMAP4 | Feb 12, 2026 07:14 |
| robert.chen@contoso.com | SMTP | Feb 12, 2026 15:14 |
Get-MgIdentityConditionalAccessPolicy | Where-Object {$_.Conditions.ClientAppTypes -contains 'exchangeActiveSync'} | Select DisplayName, StateGet-MgAuditLogSignIn -Filter "clientAppUsed ne 'Browser' and clientAppUsed ne 'Mobile Apps and Desktop clients'" -Top 10 | Measure-Object./Invoke-SecurityCollection.ps1 -OutputPath ./resultsState: enabled
Program-derived from explicit closure text or the first verification outcome.
Data Source: onprem_ad_assessment
Severity Basis: Severity based on Medium impact and affected scope.
This finding indicates measurable security and business risk. Delayed remediation increases the likelihood of operational disruption, compliance impact, and avoidable response cost.
| Control | Current State | Evidence |
|---|---|---|
| Domain Controller Patch Baseline Gap | 1 of 2 DCs fully patched (50%); DC-02 missing KB5034441 | DC-01: up to date; DC-02: 1 critical update pending (KB5034441, 18 days old) |
Get-HotFix -ComputerName (Get-ADDomainController -Filter *).HostName | Group-Object PSComputerName | Select Count, Namerepadmin /replsummary./Invoke-SecurityCollection.ps1 -OutputPath ./resultsAll DCs show latest cumulative update installed
Program-derived from explicit closure text or the first verification outcome.
Data Source: onprem_ad_assessment
Severity Basis: Severity based on Medium impact and affected scope.
This control gap increases security and operational risk. Resolve promptly to reduce breach likelihood, compliance exposure, and avoidable recovery cost.
| Infrastructure Configuration |
|---|
| USB mass storage devices are not restricted — data exfiltration risk |
Invoke-PolarisCollection -Modules All -OutputPath ./resultsONPREM-EP-004 status: pass
Program-derived from explicit closure text or the first verification outcome.
Data Source: onprem_infra_assessment.findings[ONPREM-EP-004]
Severity Basis: Severity based on Medium impact and affected scope.
This control gap increases security and operational risk. Resolve promptly to reduce breach likelihood, compliance exposure, and avoidable recovery cost.
| Infrastructure Configuration |
|---|
| Security event log is limited to 20 MB — may lose critical forensic data |
Invoke-PolarisCollection -Modules All -OutputPath ./resultsONPREM-AUD-002 status: pass
Program-derived from explicit closure text or the first verification outcome.
Data Source: onprem_infra_assessment.findings[ONPREM-AUD-002]
Severity Basis: Severity based on Medium impact and affected scope.
This control gap increases security and operational risk. Resolve promptly to reduce breach likelihood, compliance exposure, and avoidable recovery cost.
| Infrastructure Configuration |
|---|
| 1 certificates use deprecated cryptographic algorithms (SHA1/MD5) |
Invoke-PolarisCollection -Modules All -OutputPath ./resultsONPREM-CERT-002 status: pass
Program-derived from explicit closure text or the first verification outcome.
Data Source: onprem_infra_assessment.findings[ONPREM-CERT-002]
Severity Basis: Severity based on Medium impact and affected scope.
This control gap increases security and operational risk. Resolve promptly to reduce breach likelihood, compliance exposure, and avoidable recovery cost.
| Infrastructure Configuration |
|---|
| 1 computer accounts have not authenticated in over 90 days |
Invoke-PolarisCollection -Modules All -OutputPath ./resultsONPREM-AD-010 status: pass
Program-derived from explicit closure text or the first verification outcome.
Data Source: onprem_infra_assessment.findings[ONPREM-AD-010]
Severity Basis: Severity based on Medium impact and affected scope.
Identity compromise enables tenant-wide privilege abuse. Verizon DBIR 2024 reports 53% of breaches involve stolen credentials, and Microsoft reports MFA blocks 99.9% of automated account attacks.
| Name | UPN | Domain | Last sign-in |
|---|---|---|---|
| Amanda Foster | amanda.foster_clientcorp.example.com#EXT#@contoso.onmicrosoft.com | clientcorp.example.com | Not collected |
| Robert Hayes | robert.hayes_partnerfirm.example.com#EXT#@contoso.onmicrosoft.com | partnerfirm.example.com | Not collected |
| Diana Petrova | diana.petrova_outsideaudit.example.com#EXT#@contoso.onmicrosoft.com | outsideaudit.example.com | Not collected |
| Carlos Mendez | carlos.mendez_vendorservices.example.com#EXT#@contoso.onmicrosoft.com | vendorservices.example.com | Not collected |
| stale-contractor | old.contractor_defunct-company.example.com#EXT#@contoso.onmicrosoft.com | defunct-company.example.com | Not collected |
Showing 5 of 35 total | Sign-in context not collected (requires signInActivity access with AuditLog.Read.All) | Sign-in context based on 5 collected guest records
Get-MgReportAuthenticationMethodUserRegistrationDetail -Top 50 | Select-Object userPrincipalName,isMfaRegisteredIdentity-023 meets target baseline (<=20%) using all_users_summary.guest_users.
Program-derived from explicit closure text or the first verification outcome.
Data Source: all_users_summary.guest_users
Severity Basis: Severity based on Medium impact and affected scope.
Identity compromise enables tenant-wide privilege abuse. Verizon DBIR 2024 reports 53% of breaches involve stolen credentials, and Microsoft reports MFA blocks 99.9% of automated account attacks.
| Security Control |
|---|
| Risky Sign-Ins from Unknown Locations |
Showing 1 of 8 total
Get-MgReportAuthenticationMethodUserRegistrationDetail -Top 50 | Select-Object userPrincipalName,isMfaRegisteredIdentity-028 meets target baseline (<=5) using sign_in_analysis.sign_ins_from_unknown_locations.
Program-derived from explicit closure text or the first verification outcome.
Data Source: sign_in_analysis.sign_ins_from_unknown_locations
Severity Basis: Severity based on Medium impact and affected scope.
Identity compromise enables tenant-wide privilege abuse. Verizon DBIR 2024 reports 53% of breaches involve stolen credentials, and Microsoft reports MFA blocks 99.9% of automated account attacks.
| Account | Role | Auth Method |
|---|---|---|
| SMS-Based MFA Still in Significant Use | Admin | SMS |
Showing 1 of 24 total
Get-MgReportAuthenticationMethodUserRegistrationDetail -Top 50 | Select-Object userPrincipalName,isMfaRegisteredIdentity-029 meets target baseline (<=10%) using user_auth_methods.stats.sms_count.
Program-derived from explicit closure text or the first verification outcome.
Data Source: user_auth_methods.stats.sms_count
Severity Basis: Severity based on Medium impact and affected scope.
This finding indicates measurable security and business risk. Delayed remediation increases the likelihood of operational disruption, compliance impact, and avoidable response cost.
| Device |
|---|
| DESKTOP-FIN01 |
Get-MgDeviceManagementManagedDevice -Top 50 | Select-Object DeviceName,ComplianceStateDevice-011 meets target baseline (0) using managed_devices.devices[].last_sync_datetime.
Program-derived from explicit closure text or the first verification outcome.
Data Source: managed_devices.devices[].last_sync_datetime
Severity Basis: Severity based on Medium impact and affected scope.
This finding indicates measurable security and business risk. Delayed remediation increases the likelihood of operational disruption, compliance impact, and avoidable response cost.
| Device |
|---|
| DESKTOP-FIN01 |
Get-MgDeviceManagementManagedDevice -Top 50 | Select-Object DeviceName,ComplianceStateDevice-012 meets target baseline (0) using managed_devices.devices[].os_version.
Program-derived from explicit closure text or the first verification outcome.
Data Source: managed_devices.devices[].os_version
Severity Basis: Severity based on Medium impact and affected scope.
This finding indicates measurable security and business risk. Delayed remediation increases the likelihood of operational disruption, compliance impact, and avoidable response cost.
| Configuration Policy Baseline |
|---|
| No Device Configuration Policies Applied |
Get-MgDeviceManagementManagedDevice -Top 50 | Select-Object DeviceName,ComplianceStateDevice-014 meets target baseline (>=1) using device_configuration_policies.total_count.
Program-derived from explicit closure text or the first verification outcome.
Data Source: device_configuration_policies.total_count
Severity Basis: Severity based on Medium impact and affected scope.
Weak data governance increases breach and regulatory exposure. IBM Cost of a Data Breach 2024 reports a $4.88M global average breach cost, with exfiltration and compliance penalties driving long-tail impact.
| Sharepoint Site |
|---|
| Contoso - Main |
Get-MgOrganization | Select-Object DisplayName,IdDataProtection-019 meets target baseline (0 externally shared sites without approved exception) using sharepoint_sites.sites.
Program-derived from explicit closure text or the first verification outcome.
Data Source: sharepoint_sites.sites
Severity Basis: Severity based on Medium impact and affected scope.
This finding indicates measurable security and business risk. Delayed remediation increases the likelihood of operational disruption, compliance impact, and avoidable response cost.
| Name | IP Address | Associated Resource |
|---|---|---|
| Unknown | 52.160.14.27 | Unassociated |
| Unknown | 20.45.71.11 | vm-finance-jumpbox |
az graph query -q "Resources | summarize count() by type | order by count_ desc" -o tableNetwork-011 meets target baseline (0) using arm_public_ips.
Program-derived from explicit closure text or the first verification outcome.
Data Source: arm_public_ips
Severity Basis: Severity based on Medium impact and affected scope.
This finding indicates measurable security and business risk. Delayed remediation increases the likelihood of operational disruption, compliance impact, and avoidable response cost.
| Phishing Simulation Program Baseline |
|---|
| No Attack Simulation Campaigns Executed |
Get-MgSecurityAlert -Top 50 | Select-Object Severity,Status,CreatedDateTimeNetwork-014 meets target baseline (>=1) using attack_simulation.campaign_count.
Program-derived from explicit closure text or the first verification outcome.
Data Source: attack_simulation.campaign_count
Severity Basis: Severity based on Medium impact and affected scope.
Business email compromise remains the top cybercrime loss vector. FBI IC3 2024 reports median BEC losses near $50,000 per incident, with larger enterprises seeing seven-figure fraud exposure.
| Security Control |
|---|
| DMARC Record Missing Aggregate Reporting |
Get-SafeLinksPolicy | Select-Object Name,IsEnabled,EnableForInternalSendersEmail-010 meets target baseline (DMARC record includes rua= aggregate reporting destination) using email_security.dmarc_record.
Program-derived from explicit closure text or the first verification outcome.
Data Source: email_security.dmarc_record
Severity Basis: Severity based on Medium impact and affected scope.
Business email compromise remains the top cybercrime loss vector. FBI IC3 2024 reports median BEC losses near $50,000 per incident, with larger enterprises seeing seven-figure fraud exposure.
| Security Control |
|---|
| SPF Record Too Permissive |
Get-SafeLinksPolicy | Select-Object Name,IsEnabled,EnableForInternalSendersEmail-011 meets target baseline (SPF policy terminates with -all) using email_security.spf_record.
Program-derived from explicit closure text or the first verification outcome.
Data Source: email_security.spf_record
Severity Basis: Severity based on Medium impact and affected scope.
Business email compromise remains the top cybercrime loss vector. FBI IC3 2024 reports median BEC losses near $50,000 per incident, with larger enterprises seeing seven-figure fraud exposure.
| Security Control |
|---|
| DMARC Policy Not Yet Set to Reject |
Get-SafeLinksPolicy | Select-Object Name,IsEnabled,EnableForInternalSendersEmail-015 meets target baseline (reject) using email_security.dmarc_policy.
Program-derived from explicit closure text or the first verification outcome.
Data Source: email_security.dmarc_policy
Severity Basis: Severity based on Medium impact and affected scope.
Business email compromise remains the top cybercrime loss vector. FBI IC3 2024 reports median BEC losses near $50,000 per incident, with larger enterprises seeing seven-figure fraud exposure.
| Security Control |
|---|
| Mailbox Auditing Disabled for Some or All Mailboxes |
Get-SafeLinksPolicy | Select-Object Name,IsEnabled,EnableForInternalSendersEmail-017 meets target baseline (enabled) using email_security.mailbox_auditing_enabled.
Program-derived from explicit closure text or the first verification outcome.
Data Source: email_security.mailbox_auditing_enabled
Severity Basis: Severity based on Medium impact and affected scope.
Business email compromise remains the top cybercrime loss vector. FBI IC3 2024 reports median BEC losses near $50,000 per incident, with larger enterprises seeing seven-figure fraud exposure.
| Security Control |
|---|
| Email Quarantine Workflow Not Configured |
Get-SafeLinksPolicy | Select-Object Name,IsEnabled,EnableForInternalSendersEmail-019 meets target baseline (enabled) using email_security.quarantine_policy_enabled.
Program-derived from explicit closure text or the first verification outcome.
Data Source: email_security.quarantine_policy_enabled
Severity Basis: Severity based on Medium impact and affected scope.
Business email compromise remains the top cybercrime loss vector. FBI IC3 2024 reports median BEC losses near $50,000 per incident, with larger enterprises seeing seven-figure fraud exposure.
| Security Control |
|---|
| Anti-Impersonation Coverage Below Target |
Get-SafeLinksPolicy | Select-Object Name,IsEnabled,EnableForInternalSendersEmail-020 meets target baseline (>= 80%) using email_security.anti_impersonation_coverage_pct.
Program-derived from explicit closure text or the first verification outcome.
Data Source: email_security.anti_impersonation_coverage_pct
Severity Basis: Severity based on Medium impact and affected scope.
Non-compliant endpoints materially increase lateral-movement risk. Microsoft security telemetry shows unmanaged or weakly managed devices have materially higher incident rates and recovery costs often exceed $8,000 per endpoint.
| Security Control |
|---|
| DESKTOP-FIN01 |
Get-MgDeviceManagementManagedDevice -Top 50 | Select-Object DeviceName,ComplianceStateEndpoint-006 meets target baseline (0 devices on outdated/EOL operating systems) using managed_devices.devices.
Program-derived from explicit closure text or the first verification outcome.
Data Source: managed_devices.devices
Severity Basis: Severity based on Medium impact and affected scope.
Non-compliant endpoints materially increase lateral-movement risk. Microsoft security telemetry shows unmanaged or weakly managed devices have materially higher incident rates and recovery costs often exceed $8,000 per endpoint.
| Security Control |
|---|
| DESKTOP-FIN01 |
Get-MgDeviceManagementManagedDevice -Top 50 | Select-Object DeviceName,ComplianceStateEndpoint-008 meets target baseline (0 stale devices over 90 days) using managed_devices.devices.
Program-derived from explicit closure text or the first verification outcome.
Data Source: managed_devices.devices
Severity Basis: Severity based on Medium impact and affected scope.
Non-compliant endpoints materially increase lateral-movement risk. Microsoft security telemetry shows unmanaged or weakly managed devices have materially higher incident rates and recovery costs often exceed $8,000 per endpoint.
| Security Control |
|---|
| Defender Attack Surface Reduction Rules Not Enforced |
Get-MgDeviceManagementManagedDevice -Top 50 | Select-Object DeviceName,ComplianceStateEndpoint-012 meets target baseline (enabled) using mde_summary.asr_rules_enabled.
Program-derived from explicit closure text or the first verification outcome.
Data Source: mde_summary.asr_rules_enabled
Severity Basis: Severity based on Medium impact and affected scope.
Non-compliant endpoints materially increase lateral-movement risk. Microsoft security telemetry shows unmanaged or weakly managed devices have materially higher incident rates and recovery costs often exceed $8,000 per endpoint.
| Device | OS | Owner |
|---|---|---|
| SRP-PC001 | Windows | sarah.chen@contoso.com |
| SRP-PC012 | Windows | marcus.williams@contoso.com |
| SRP-MAC003 | macOS | emily.rodriguez@contoso.com |
| SRP-PC025 | Windows | james.okafor@contoso.com |
| SRP-IPAD005 | iOS | rachel.kim@contoso.com |
| SRP-PC038 | Windows | thomas.bergstrom@contoso.com |
| SRP-PC006 | Windows | emily.watson@contoso.com |
| SRP-PC007 | Windows | james.liu@contoso.com |
| SRP-MAC006 | macOS | maria.garcia@contoso.com |
| SRP-iPHONE004 | iOS | priya.patel@contoso.com |
Get-MgDeviceManagementManagedDevice -Top 50 | Select-Object DeviceName,ComplianceStateEndpoint-014 meets target baseline (>= 80% Defender onboarding coverage) using mde_summary.onboarded_devices.
Program-derived from explicit closure text or the first verification outcome.
Data Source: mde_summary.onboarded_devices
Severity Basis: Severity based on Medium impact and affected scope.
Non-compliant endpoints materially increase lateral-movement risk. Microsoft security telemetry shows unmanaged or weakly managed devices have materially higher incident rates and recovery costs often exceed $8,000 per endpoint.
| Security Control |
|---|
| Defender EDR Block Mode Disabled |
Get-MgDeviceManagementManagedDevice -Top 50 | Select-Object DeviceName,ComplianceStateEndpoint-015 meets target baseline (enabled) using mde_summary.edr_block_mode_enabled.
Program-derived from explicit closure text or the first verification outcome.
Data Source: mde_summary.edr_block_mode_enabled
Severity Basis: Severity based on Medium impact and affected scope.
Weak data governance increases breach and regulatory exposure. IBM Cost of a Data Breach 2024 reports a $4.88M global average breach cost, with exfiltration and compliance penalties driving long-tail impact.
| Security Control |
|---|
| eDiscovery Response Workflows Not Configured |
Get-MgOrganization | Select-Object DisplayName,IdDataProtection-004 meets target baseline (enabled) using data_protection.ediscovery_enabled.
Program-derived from explicit closure text or the first verification outcome.
Data Source: data_protection.ediscovery_enabled
Severity Basis: Severity based on Medium impact and affected scope.
Weak data governance increases breach and regulatory exposure. IBM Cost of a Data Breach 2024 reports a $4.88M global average breach cost, with exfiltration and compliance penalties driving long-tail impact.
| Security Controls |
|---|
| External Sharing Unrestricted on SharePoint Sites |
Showing 1 of 3 total
Get-MgOrganization | Select-Object DisplayName,IdDataProtection-006 meets target baseline (0 unrestricted externally shared sites) using sharepoint_sites.external_sharing_open_sites.
Program-derived from explicit closure text or the first verification outcome.
Data Source: sharepoint_sites.external_sharing_open_sites
Severity Basis: Severity based on Medium impact and affected scope.
Weak data governance increases breach and regulatory exposure. IBM Cost of a Data Breach 2024 reports a $4.88M global average breach cost, with exfiltration and compliance penalties driving long-tail impact.
| Security Control |
|---|
| OneDrive External Sharing Open |
Get-MgOrganization | Select-Object DisplayName,IdDataProtection-007 meets target baseline (restricted sharing with governance controls) using sharepoint_sites.onedrive_external_sharing_open.
Program-derived from explicit closure text or the first verification outcome.
Data Source: sharepoint_sites.onedrive_external_sharing_open
Severity Basis: Severity based on Medium impact and affected scope.
Weak data governance increases breach and regulatory exposure. IBM Cost of a Data Breach 2024 reports a $4.88M global average breach cost, with exfiltration and compliance penalties driving long-tail impact.
| Security Control |
|---|
| Retention Period Below Compliance Baseline |
Get-MgOrganization | Select-Object DisplayName,IdDataProtection-009 meets target baseline (>= 365 days baseline retention for regulated workloads) using retention_policies.min_retention_days.
Program-derived from explicit closure text or the first verification outcome.
Data Source: retention_policies.min_retention_days
Severity Basis: Severity based on Medium impact and affected scope.
Identity compromise enables tenant-wide privilege abuse. Verizon DBIR 2024 reports 53% of breaches involve stolen credentials, and Microsoft reports MFA blocks 99.9% of automated account attacks.
| Security Control |
|---|
| No Access Reviews Configured |
Get-MgReportAuthenticationMethodUserRegistrationDetail -Top 50 | Select-Object userPrincipalName,isMfaRegisteredIdentity-019 meets target baseline (Recurring access reviews for privileged and guest access) using privileged_accounts.access_reviews_count.
Program-derived from explicit closure text or the first verification outcome.
Data Source: privileged_accounts.access_reviews_count
Severity Basis: Severity based on Medium impact and affected scope.
Identity compromise enables tenant-wide privilege abuse. Verizon DBIR 2024 reports 53% of breaches involve stolen credentials, and Microsoft reports MFA blocks 99.9% of automated account attacks.
| Application | Permissions | Consent Type | Risky Perms |
|---|---|---|---|
| DataSync Pro (Unverified) | User.Read.All, Mail.ReadWrite, Files.ReadWrite.All, Directory.Read.All, Sites.FullControl.All | 0 users | 5 |
Get-MgReportAuthenticationMethodUserRegistrationDetail -Top 50 | Select-Object userPrincipalName,isMfaRegisteredIdentity-022 meets target baseline (Admin consent workflow required for high-risk app permissions) using oauth_audit.user_consent_allowed.
Program-derived from explicit closure text or the first verification outcome.
Data Source: oauth_audit.user_consent_allowed
Severity Basis: Severity based on Medium impact and affected scope.
Cloud misconfiguration remains a primary breach driver. Public exposure and weak network controls can enable rapid compromise, outage, and recovery costs that frequently exceed six figures for SMB environments.
| Security Control |
|---|
| SQL Servers Without Azure AD Authentication |
az graph query -q "Resources | summarize count() by type | order by count_ desc" -o tableInfrastructure-012 meets target baseline (Azure AD authentication configured on all SQL servers) using arm_sql_servers.aad_auth_disabled_count.
Program-derived from explicit closure text or the first verification outcome.
Data Source: arm_sql_servers.aad_auth_disabled_count
Severity Basis: Severity based on Medium impact and affected scope.
Cloud misconfiguration remains a primary breach driver. Public exposure and weak network controls can enable rapid compromise, outage, and recovery costs that frequently exceed six figures for SMB environments.
| Security Controls |
|---|
| Key Vault Secrets Not Rotated |
Showing 1 of 2 total
az graph query -q "Resources | summarize count() by type | order by count_ desc" -o tableInfrastructure-013 meets target baseline (All secrets rotated within defined policy interval) using arm_key_vaults.stale_secret_count.
Program-derived from explicit closure text or the first verification outcome.
Data Source: arm_key_vaults.stale_secret_count
Severity Basis: Severity based on Medium impact and affected scope.
Cloud misconfiguration remains a primary breach driver. Public exposure and weak network controls can enable rapid compromise, outage, and recovery costs that frequently exceed six figures for SMB environments.
| Security Control |
|---|
| No Private Endpoints for PaaS Resources |
az graph query -q "Resources | summarize count() by type | order by count_ desc" -o tableInfrastructure-014 meets target baseline (Private endpoints enabled for internet-facing PaaS resources) using arm_private_endpoints.total_count.
Program-derived from explicit closure text or the first verification outcome.
Data Source: arm_private_endpoints.total_count
Severity Basis: Severity based on Medium impact and affected scope.
This finding indicates measurable security and business risk. Delayed remediation increases the likelihood of operational disruption, compliance impact, and avoidable response cost.
| Security Controls |
|---|
| Critical Azure Resources Missing Diagnostic Logging |
Showing 1 of 3 total
az graph query -q "Resources | summarize count() by type | order by count_ desc" -o tableCloudPosture-003 meets target baseline (0 critical resources missing diagnostic settings) using arm_diagnostic_settings.missing_count.
Program-derived from explicit closure text or the first verification outcome.
Data Source: arm_diagnostic_settings.missing_count
Severity Basis: Severity based on Medium impact and affected scope.
This finding indicates measurable security and business risk. Delayed remediation increases the likelihood of operational disruption, compliance impact, and avoidable response cost.
| Security Control |
|---|
| No Azure Policy Assignments Detected |
az graph query -q "Resources | summarize count() by type | order by count_ desc" -o tableCloudPosture-004 meets target baseline (>= 1 baseline Azure policy initiative assigned) using arm_policy_assignments.total_count.
Program-derived from explicit closure text or the first verification outcome.
Data Source: arm_policy_assignments.total_count
Severity Basis: Severity based on Medium impact and affected scope.
This finding indicates measurable security and business risk. Delayed remediation increases the likelihood of operational disruption, compliance impact, and avoidable response cost.
| Security Control |
|---|
| No Analytic Rules for Critical Threat Scenarios |
Get-MgSecurityAlert -Top 50 | Select-Object Severity,Status,CreatedDateTimeResilience-003 meets target baseline (>= 1 high-confidence alert rule per critical threat scenario) using log_analytics_summary.alert_rules_count.
Program-derived from explicit closure text or the first verification outcome.
Data Source: log_analytics_summary.alert_rules_count
Severity Basis: Severity based on Medium impact and affected scope.
This finding indicates measurable security and business risk. Delayed remediation increases the likelihood of operational disruption, compliance impact, and avoidable response cost.
| Security Control |
|---|
| Backup Restore Testing Stale |
Get-MgSecurityAlert -Top 50 | Select-Object Severity,Status,CreatedDateTimeResilience-004 meets target baseline (Restore tests executed every <= 180 days) using backup_health.restore_test_last_days.
Program-derived from explicit closure text or the first verification outcome.
Data Source: backup_health.restore_test_last_days
Severity Basis: Severity based on Medium impact and affected scope.
CMMC practice SC.L2-3.13.2 (Security Engineering) in the System and Communications Protection domain is partial. This control carries a SPRS weight of -3 points. Non-compliance with this practice will reduce your SPRS score and may block CMMC Level 2 certification.
| Remediation Action | Priority |
|---|---|
| Deploy architecturally sound security designs: defense-in-depth with multiple control layers | Required |
| Implement network segmentation — separate CUI data stores from general-purpose networks | Required |
| Enable Azure Private Endpoints for all data services (Storage, CosmosDB, SQL) | Required |
| Configure DLP policies to prevent CUI from leaving the controlled environment | Required |
| Document the security architecture including network diagrams and data flow maps | Required |
Assessment: Assessed via Manual Questionnaire
Get-AzPrivateEndpoint | Select Name, ProvisioningStateVerification evidence confirms the control is implemented.
Program-derived from explicit closure text or the first verification outcome.
Data Source: CMMC Evidence Assessment (Manual Questionnaire)
Severity Basis: Severity medium based on SPRS weight (-3) and CMMC certification impact.
CMMC practice CM.L2-3.4.5 (Access Restrictions for Change) in the Configuration Management domain is partial. This control carries a SPRS weight of -3 points. Non-compliance with this practice will reduce your SPRS score and may block CMMC Level 2 certification.
| Remediation Action | Priority |
|---|---|
| Define and document authorized software for all organizational systems | Required |
| Deploy application control using Microsoft Defender Application Control (WDAC) or AppLocker | Required |
| Block unapproved software installation via Intune app management policies | Required |
| Maintain a software allowlist and review quarterly | Required |
| Audit installed software on all devices: Get-MgDeviceManagementDetectedApp | Select DisplayName, DeviceCount | Required |
Assessment: Assessed via Manual Questionnaire
Query control evidence and capture the result: Review Intune > Apps > Discovered apps for unauthorized software. Verify AppLocker/WDAC policies are enforced on managed devices.Verification evidence confirms the control is implemented.
Program-derived from explicit closure text or the first verification outcome.
Data Source: CMMC Evidence Assessment (Manual Questionnaire)
Severity Basis: Severity medium based on SPRS weight (-3) and CMMC certification impact.
CMMC practice SI.L2-3.14.2 (Malicious Code Protection) in the System and Information Integrity domain is partial. This control carries a SPRS weight of -3 points. Non-compliance with this practice will reduce your SPRS score and may block CMMC Level 2 certification.
| Remediation Action | Priority |
|---|---|
| Deploy Microsoft Defender for Endpoint on all managed devices | Required |
| Enable real-time protection, cloud-delivered protection, and automatic sample submission | Required |
| Configure anti-malware policies in Intune: scheduled scans (weekly full, daily quick) | Required |
| Enable Defender SmartScreen for Edge browser and Windows | Required |
| Deploy ASR (Attack Surface Reduction) rules in audit mode, then enforce after 30 days | Required |
Assessment: Assessed via PowerShell Collector
Get-MgDeviceManagementDeviceComplianceDeviceStatus to check Defender enrollment. Verify real-time protection: Get-MpComputerStatus | Select RealTimeProtectionEnabled.Verification evidence confirms the control is implemented.
Program-derived from explicit closure text or the first verification outcome.
Data Source: CMMC Evidence Assessment (PowerShell Collector)
Severity Basis: Severity medium based on SPRS weight (-3) and CMMC certification impact.
CMMC practice SI.L2-3.14.5 (Advanced Persistent Threat Protection) in the System and Information Integrity domain is fail. This control carries a SPRS weight of -3 points. Non-compliance with this practice will reduce your SPRS score and may block CMMC Level 2 certification.
| Remediation Action | Priority |
|---|---|
| Deploy Microsoft Defender for Endpoint P2 with EDR (Endpoint Detection and Response) capabilities | Required |
| Enable automated investigation and remediation in Defender XDR | Required |
| Configure Defender for Identity to detect lateral movement and credential theft in Active Directory | Required |
| Deploy Microsoft Defender for Cloud Apps for shadow IT detection and SaaS application monitoring | Required |
| Enable attack disruption capabilities to automatically contain compromised users and devices | Required |
Assessment: Assessed via Manual Questionnaire
Query control evidence and capture the result: Verify Defender for Endpoint P2 onboarding: check Microsoft 365 Defender portal > Endpoints > Device inventory. Confirm EDR is collecting telemetry from all managed devices.Verification evidence confirms the control is implemented.
Program-derived from explicit closure text or the first verification outcome.
Data Source: CMMC Evidence Assessment (Manual Questionnaire)
Severity Basis: Severity medium based on SPRS weight (-3) and CMMC certification impact.
Reduced Kerberoasting cost — attacker needs fewer computational resources to crack captured TGS tickets.
Get-ADUser -Filter * -Properties 'msDS-SupportedEncryptionTypes' | Where-Object { $_.'msDS-SupportedEncryptionTypes' -band 4 }Command returns the expected value above.
Program-derived from explicit closure text or the first verification outcome.
Detection and response lose their single highest-signal source for PowerShell-based intrusion activity.
Get-ItemProperty 'HKLM:\Software\Policies\Microsoft\Windows\PowerShell\ScriptBlockLogging' EnableScriptBlockLoggingCommand returns the expected value above.
Program-derived from explicit closure text or the first verification outcome.
Credential dumping (Mimikatz) against lsass is easier than it should be post-compromise.
Get-ItemProperty 'HKLM:\System\CurrentControlSet\Control\Lsa' RunAsPPLCommand returns the expected value above.
Program-derived from explicit closure text or the first verification outcome.
Captured authentication traffic from internal segments can be relayed or cracked offline in seconds.
Get-ItemProperty 'HKLM:\System\CurrentControlSet\Control\Lsa' LmCompatibilityLevelCommand returns the expected value above.
Program-derived from explicit closure text or the first verification outcome.
Business email compromise remains the top cybercrime loss vector. FBI IC3 2024 reports median BEC losses near $50,000 per incident, with larger enterprises seeing seven-figure fraud exposure.
| Category | Count |
|---|---|
| Spam | 892 |
| Phishing | 34 |
| Malware | 3 |
| Total | 929 |
Get-SafeLinksPolicy | Select Name,IsEnabled,EnableForInternalSendersGet-MalwareFilterPolicy | Select Identity,ZapEnabledAll policies enabled, internal senders covered
Program-derived from explicit closure text or the first verification outcome.
Data Source: email_security
Severity Basis: Severity based on Low impact and affected scope.
Weak data governance increases breach and regulatory exposure. IBM Cost of a Data Breach 2024 reports a $4.88M global average breach cost, with exfiltration and compliance penalties driving long-tail impact.
| Label Name | Status |
|---|---|
| Confidential | Active |
| Highly Confidential | Active |
Get-LabelPolicy | Select Name, LabelsGet-AutoSensitivityLabelPolicy | Select Name, Mode, EnabledAll labels published to user groups
Program-derived from explicit closure text or the first verification outcome.
Data Source: purview_summary
Severity Basis: Severity based on Low impact and affected scope.
Identified spend inefficiencies create direct, recurring waste. Converting these findings into action typically reclaims monthly OPEX immediately and compounds into annual savings with no reduction in security posture.
Overlapping security tooling appears to create avoidable run-rate spend of $640/month ($7,680/year).
| Security Tooling Overlap |
|---|
| crowdstrike falcon |
| defender for endpoint |
| defender for office 365 |
| mimecast |
az graph query -q "Resources | summarize count() by type | order by count_ desc" -o tableCost-007 meets target baseline ($0/month ($0/year)) using cost_summary.duplicate_tools.
Program-derived from explicit closure text or the first verification outcome.
Data Source: cost_summary.duplicate_tools
Severity Basis: Severity based on Low impact and affected scope.
Identity compromise enables tenant-wide privilege abuse. Verizon DBIR 2024 reports 53% of breaches involve stolen credentials, and Microsoft reports MFA blocks 99.9% of automated account attacks.
| Security Control |
|---|
| Disabled Accounts Are Not Being Removed |
Showing 1 of 15 total
Get-MgReportAuthenticationMethodUserRegistrationDetail -Top 50 | Select-Object userPrincipalName,isMfaRegisteredIdentity-024 meets target baseline (<=10) using all_users_summary.disabled_users.
Program-derived from explicit closure text or the first verification outcome.
Data Source: all_users_summary.disabled_users
Severity Basis: Severity based on Low impact and affected scope.
Identity compromise enables tenant-wide privilege abuse. Verizon DBIR 2024 reports 53% of breaches involve stolen credentials, and Microsoft reports MFA blocks 99.9% of automated account attacks.
| Security Control |
|---|
| No Passwordless Authentication Adoption |
Showing 1 of 150 total
Get-MgReportAuthenticationMethodUserRegistrationDetail -Top 50 | Select-Object userPrincipalName,isMfaRegisteredIdentity-030 meets target baseline (>0) using user_auth_methods.stats.passwordless_count.
Program-derived from explicit closure text or the first verification outcome.
Data Source: user_auth_methods.stats.passwordless_count
Severity Basis: Severity based on Low impact and affected scope.
Weak data governance increases breach and regulatory exposure. IBM Cost of a Data Breach 2024 reports a $4.88M global average breach cost, with exfiltration and compliance penalties driving long-tail impact.
| Records Management Baseline |
|---|
| Records Management Controls Disabled |
Get-MgOrganization | Select-Object DisplayName,IdDataProtection-016 meets target baseline (enabled) using records_management.enabled.
Program-derived from explicit closure text or the first verification outcome.
Data Source: records_management.enabled
Severity Basis: Severity based on Low impact and affected scope.
Weak data governance increases breach and regulatory exposure. IBM Cost of a Data Breach 2024 reports a $4.88M global average breach cost, with exfiltration and compliance penalties driving long-tail impact.
| Microsoft Team |
|---|
| All Company |
| Leadership Team |
| Client Services |
| IT Operations |
| Human Resources |
Showing 5 of 8 total
Get-MgOrganization | Select-Object DisplayName,IdDataProtection-020 meets target baseline (0) using teams_summary.teams.
Program-derived from explicit closure text or the first verification outcome.
Data Source: teams_summary.teams
Severity Basis: Severity based on Low impact and affected scope.
This finding indicates measurable security and business risk. Delayed remediation increases the likelihood of operational disruption, compliance impact, and avoidable response cost.
| Conditional Access Location Baseline |
|---|
| No Named Locations Configured |
Get-MgReportAuthenticationMethodUserRegistrationDetail -Top 50 | Select-Object userPrincipalName,isMfaRegisteredNetwork-012 meets target baseline (>=1) using named_locations.total_count.
Program-derived from explicit closure text or the first verification outcome.
Data Source: named_locations.total_count
Severity Basis: Severity based on Low impact and affected scope.
Business email compromise remains the top cybercrime loss vector. FBI IC3 2024 reports median BEC losses near $50,000 per incident, with larger enterprises seeing seven-figure fraud exposure.
| Security Control |
|---|
| External Sender Warning Banner Disabled |
Get-SafeLinksPolicy | Select-Object Name,IsEnabled,EnableForInternalSendersEmail-018 meets target baseline (enabled) using email_security.external_sender_tag_enabled.
Program-derived from explicit closure text or the first verification outcome.
Data Source: email_security.external_sender_tag_enabled
Severity Basis: Severity based on Low impact and affected scope.
Non-compliant endpoints materially increase lateral-movement risk. Microsoft security telemetry shows unmanaged or weakly managed devices have materially higher incident rates and recovery costs often exceed $8,000 per endpoint.
| Security Control |
|---|
| Windows Autopilot Profiles Not Configured |
Get-MgDeviceManagementManagedDevice -Top 50 | Select-Object DeviceName,ComplianceStateEndpoint-010 meets target baseline (>= 1 production autopilot profile) using device_configuration_policies.autopilot_profiles.
Program-derived from explicit closure text or the first verification outcome.
Data Source: device_configuration_policies.autopilot_profiles
Severity Basis: Severity based on Low impact and affected scope.
Weak data governance increases breach and regulatory exposure. IBM Cost of a Data Breach 2024 reports a $4.88M global average breach cost, with exfiltration and compliance penalties driving long-tail impact.
| Security Control |
|---|
| Information Barriers Not Configured for Restricted Communications |
Get-MgOrganization | Select-Object DisplayName,IdDataProtection-005 meets target baseline (enabled) using information_protection_policies.information_barriers_enabled.
Program-derived from explicit closure text or the first verification outcome.
Data Source: information_protection_policies.information_barriers_enabled
Severity Basis: Severity based on Low impact and affected scope.
Weak data governance increases breach and regulatory exposure. IBM Cost of a Data Breach 2024 reports a $4.88M global average breach cost, with exfiltration and compliance penalties driving long-tail impact.
| Label Name | Status |
|---|---|
| Confidential | Active |
| Highly Confidential | Active |
Get-MgOrganization | Select-Object DisplayName,IdDataProtection-008 meets target baseline (>= 1 auto-label policy for sensitive data classes) using sensitivity_labels.auto_label_policy_count.
Program-derived from explicit closure text or the first verification outcome.
Data Source: sensitivity_labels.auto_label_policy_count
Severity Basis: Severity based on Low impact and affected scope.
This finding indicates measurable security and business risk. Delayed remediation increases the likelihood of operational disruption, compliance impact, and avoidable response cost.
| Security Controls |
|---|
| Cloud Resource Ownership Tags Missing at Scale |
Showing 1 of 25 total
az graph query -q "Resources | summarize count() by type | order by count_ desc" -o tableCloudPosture-005 meets target baseline (<= 10 untagged resources) using arm_resource_tags.missing_tags_count.
Program-derived from explicit closure text or the first verification outcome.
Data Source: arm_resource_tags.missing_tags_count
Severity Basis: Severity based on Low impact and affected scope.
This finding indicates measurable security and business risk. Delayed remediation increases the likelihood of operational disruption, compliance impact, and avoidable response cost.
| Security Control |
|---|
| No Recent Security Tabletop Exercises |
Get-MgSecurityAlert -Top 50 | Select-Object Severity,Status,CreatedDateTimeResilience-005 meets target baseline (Tabletop exercise completed within last 365 days) using resilience.tabletop_exercise_last_days.
Program-derived from explicit closure text or the first verification outcome.
Data Source: resilience.tabletop_exercise_last_days
Severity Basis: Severity based on Low impact and affected scope.
None — control is in place.
Get-Acl \\corp.contoso.local\SYSVOLCommand returns the expected value above.
Program-derived from explicit closure text or the first verification outcome.
2 controls failing · 60% not yet assessed.
3 controls failing · 23% not yet assessed.
3 controls failing · 41% not yet assessed.
3 controls failing · 72% not yet assessed.
Make cybersecurity risk part of how the organization understands its mission, stakeholders, and legal obligations — not a side function.
If leadership does not explicitly tie security to the mission, security decisions get deprioritized during budget cycles and strategic shifts.
Govern — establish and monitor the organization's cybersecurity risk management strategy, expectations, and policy.
Govern — establish and monitor the organization's cybersecurity risk management strategy, expectations, and policy.
Maintain a live inventory of every physical device connected to the network — laptops, servers, network gear, IoT, printers.
Unknown devices are the easiest way for an attacker to maintain persistence.
Identify — understand the organization's assets, risks, and context so security decisions are informed by business reality.
Identify — understand the organization's assets, risks, and context so security decisions are informed by business reality.
Identify — understand the organization's assets, risks, and context so security decisions are informed by business reality.
Identify — understand the organization's assets, risks, and context so security decisions are informed by business reality.
Every user and service has a unique, verified identity before being given access. No shared accounts.
Shared credentials destroy accountability — once they leak, there is no way to tell which human did what.
Protect — apply safeguards to ensure delivery of critical services and limit the impact of a cybersecurity event.
Protect — apply safeguards to ensure delivery of critical services and limit the impact of a cybersecurity event.
Grant the smallest set of permissions people need to do their job, and review them regularly. Revoke access the moment it is no longer needed.
Accounts with excess privilege are the primary vehicle for lateral movement after an initial breach.
Protect — apply safeguards to ensure delivery of critical services and limit the impact of a cybersecurity event.
Protect — apply safeguards to ensure delivery of critical services and limit the impact of a cybersecurity event.
Protect — apply safeguards to ensure delivery of critical services and limit the impact of a cybersecurity event.
Protect — apply safeguards to ensure delivery of critical services and limit the impact of a cybersecurity event.
Segment networks, protect them from unauthorized access, and monitor traffic for anomalies.
A flat network turns a foothold on one laptop into a breach of the whole business.
Detect — discover cybersecurity events in a timely manner.
Detect — discover cybersecurity events in a timely manner.
Detect — discover cybersecurity events in a timely manner.
Detect — discover cybersecurity events in a timely manner.
Respond — take action when a cybersecurity event is detected.
Respond — take action when a cybersecurity event is detected.
Recover — restore capabilities or services that were impaired due to a cybersecurity event.
Recover — restore capabilities or services that were impaired due to a cybersecurity event.
Establish and Maintain Detailed Enterprise Asset Inventory. This control is tracked in CIS v8 IG2 but has no plain-language summary in the Polaris catalog yet.
Address Unauthorized Assets. This control is tracked in CIS v8 IG2 but has no plain-language summary in the Polaris catalog yet.
Establish and Maintain a Software Inventory. This control is tracked in CIS v8 IG2 but has no plain-language summary in the Polaris catalog yet.
Ensure Authorized Software is Currently Supported. This control is tracked in CIS v8 IG2 but has no plain-language summary in the Polaris catalog yet.
Address Unauthorized Software. This control is tracked in CIS v8 IG2 but has no plain-language summary in the Polaris catalog yet.
Establish and Maintain a Data Management Process. This control is tracked in CIS v8 IG2 but has no plain-language summary in the Polaris catalog yet.
Establish and Maintain a Data Inventory. This control is tracked in CIS v8 IG2 but has no plain-language summary in the Polaris catalog yet.
Configure data-access ACLs so only the people who need a dataset can reach it.
[paraphrased — see source]Enforce Data Retention. This control is tracked in CIS v8 IG2 but has no plain-language summary in the Polaris catalog yet.
Encrypt Data on End-User Devices. This control is tracked in CIS v8 IG2 but has no plain-language summary in the Polaris catalog yet.
Establish and Maintain a Secure Configuration Process. This control is tracked in CIS v8 IG2 but has no plain-language summary in the Polaris catalog yet.
Configure Automatic Session Locking on Enterprise Assets. This control is tracked in CIS v8 IG2 but has no plain-language summary in the Polaris catalog yet.
Manage Default Accounts on Enterprise Assets and Software. This control is tracked in CIS v8 IG2 but has no plain-language summary in the Polaris catalog yet.
Keep a current list of user and service accounts across all systems, including what each one can access.
[paraphrased — see source]Use Unique Passwords. This control is tracked in CIS v8 IG2 but has no plain-language summary in the Polaris catalog yet.
Disable Dormant Accounts. This control is tracked in CIS v8 IG2 but has no plain-language summary in the Polaris catalog yet.
Keep administrative privileges on dedicated admin accounts separate from day-to-day accounts.
[paraphrased — see source]Establish an Access Granting Process. This control is tracked in CIS v8 IG2 but has no plain-language summary in the Polaris catalog yet.
Establish an Access Revoking Process. This control is tracked in CIS v8 IG2 but has no plain-language summary in the Polaris catalog yet.
Require MFA for Externally-Exposed Applications. This control is tracked in CIS v8 IG2 but has no plain-language summary in the Polaris catalog yet.
Require MFA for any remote access into the environment.
[paraphrased — see source]Require MFA on every administrator account, every sign-in.
[paraphrased — see source]Establish and Maintain a Vulnerability Management Process. This control is tracked in CIS v8 IG2 but has no plain-language summary in the Polaris catalog yet.
Establish and Maintain a Remediation Process. This control is tracked in CIS v8 IG2 but has no plain-language summary in the Polaris catalog yet.
Deploy OS patches automatically on a defined schedule instead of manually per server.
[paraphrased — see source]Establish and Maintain an Audit Log Management Process. This control is tracked in CIS v8 IG2 but has no plain-language summary in the Polaris catalog yet.
Collect Audit Logs. This control is tracked in CIS v8 IG2 but has no plain-language summary in the Polaris catalog yet.
Ensure Adequate Audit Log Storage. This control is tracked in CIS v8 IG2 but has no plain-language summary in the Polaris catalog yet.
Ensure Use of Only Fully Supported Browsers and Email Clients. This control is tracked in CIS v8 IG2 but has no plain-language summary in the Polaris catalog yet.
Use DNS Filtering Services. This control is tracked in CIS v8 IG2 but has no plain-language summary in the Polaris catalog yet.
Deploy and maintain anti-malware software across managed endpoints.
[paraphrased — see source]Configure Automatic Anti-Malware Signature Updates. This control is tracked in CIS v8 IG2 but has no plain-language summary in the Polaris catalog yet.
Disable Autorun and Autoplay for Removable Media. This control is tracked in CIS v8 IG2 but has no plain-language summary in the Polaris catalog yet.
Establish and Maintain a Data Recovery Process. This control is tracked in CIS v8 IG2 but has no plain-language summary in the Polaris catalog yet.
Perform Automated Backups. This control is tracked in CIS v8 IG2 but has no plain-language summary in the Polaris catalog yet.
Protect Recovery Data. This control is tracked in CIS v8 IG2 but has no plain-language summary in the Polaris catalog yet.
Establish and Maintain an Isolated Instance of Recovery Data. This control is tracked in CIS v8 IG2 but has no plain-language summary in the Polaris catalog yet.
Centralize Security Event Alerting. This control is tracked in CIS v8 IG2 but has no plain-language summary in the Polaris catalog yet.
Establish and Maintain a Security Awareness Program. This control is tracked in CIS v8 IG2 but has no plain-language summary in the Polaris catalog yet.
Train Workforce Members to Recognize Social Engineering Attacks. This control is tracked in CIS v8 IG2 but has no plain-language summary in the Polaris catalog yet.
Train Workforce Members on Authentication Best Practices. This control is tracked in CIS v8 IG2 but has no plain-language summary in the Polaris catalog yet.
Train Workforce Members on Data Handling Best Practices. This control is tracked in CIS v8 IG2 but has no plain-language summary in the Polaris catalog yet.
Train Workforce Members on Causes of Unintentional Data Exposure. This control is tracked in CIS v8 IG2 but has no plain-language summary in the Polaris catalog yet.
Demonstrates commitment to integrity and ethical values. This control is tracked in SOC 2 TSC but has no plain-language summary in the Polaris catalog yet.
Board exercises oversight of internal controls. This control is tracked in SOC 2 TSC but has no plain-language summary in the Polaris catalog yet.
Obtains and uses relevant quality information. This control is tracked in SOC 2 TSC but has no plain-language summary in the Polaris catalog yet.
Specifies objectives and identifies risks. This control is tracked in SOC 2 TSC but has no plain-language summary in the Polaris catalog yet.
Identifies and assesses risks to objectives. This control is tracked in SOC 2 TSC but has no plain-language summary in the Polaris catalog yet.
Logical access security over information assets. This control is tracked in SOC 2 TSC but has no plain-language summary in the Polaris catalog yet.
Access restricted to authorized personnel. This control is tracked in SOC 2 TSC but has no plain-language summary in the Polaris catalog yet.
Security of access credentials. This control is tracked in SOC 2 TSC but has no plain-language summary in the Polaris catalog yet.
Implement logical access controls — authentication, authorization, and access restriction — to prevent unauthorized access to information assets.
[paraphrased — see source]Encryption of data in transit. This control is tracked in SOC 2 TSC but has no plain-language summary in the Polaris catalog yet.
Additions, modifications, and removals of user access to systems are authorized and tracked.
[paraphrased — see source]Security measures against threats to infrastructure. This control is tracked in SOC 2 TSC but has no plain-language summary in the Polaris catalog yet.
Restricts transmission and movement of data. This control is tracked in SOC 2 TSC but has no plain-language summary in the Polaris catalog yet.
Monitor system components for anomalies and indicators of compromise.
[paraphrased — see source]Detects and reports security incidents. This control is tracked in SOC 2 TSC but has no plain-language summary in the Polaris catalog yet.
Evaluates and responds to security incidents. This control is tracked in SOC 2 TSC but has no plain-language summary in the Polaris catalog yet.
Responds to identified security incidents. This control is tracked in SOC 2 TSC but has no plain-language summary in the Polaris catalog yet.
Authorize, test, document, and approve changes to infrastructure, software, and procedures before production.
[paraphrased — see source]Maintains availability commitments and system requirements. This control is tracked in SOC 2 TSC but has no plain-language summary in the Polaris catalog yet.
Environmental protections and recovery mechanisms. This control is tracked in SOC 2 TSC but has no plain-language summary in the Polaris catalog yet.
Tests recovery plan procedures. This control is tracked in SOC 2 TSC but has no plain-language summary in the Polaris catalog yet.
Identifies and maintains confidential information. This control is tracked in SOC 2 TSC but has no plain-language summary in the Polaris catalog yet.
Disposes of confidential information per policy. This control is tracked in SOC 2 TSC but has no plain-language summary in the Polaris catalog yet.
Obtains and communicates processing integrity commitments. This control is tracked in SOC 2 TSC but has no plain-language summary in the Polaris catalog yet.
System inputs are complete, accurate, and valid. This control is tracked in SOC 2 TSC but has no plain-language summary in the Polaris catalog yet.
Privacy notice provided to data subjects. This control is tracked in SOC 2 TSC but has no plain-language summary in the Polaris catalog yet.
Choice and consent obtained for data collection. This control is tracked in SOC 2 TSC but has no plain-language summary in the Polaris catalog yet.
Access Control — CMMC practices limiting system access to authorized users, processes, and devices.
Access Control — CMMC practices limiting system access to authorized users, processes, and devices.
Privileged accounts (domain admins, cloud admins, root) are issued only when necessary, used only for privileged tasks, and never used for routine work like email.
The single most-cited CMMC Level 2 finding. Abuse of privileged accounts is the primary ransomware path from foothold to domain takeover.
Access Control — CMMC practices limiting system access to authorized users, processes, and devices.
Access Control — CMMC practices limiting system access to authorized users, processes, and devices.
Access Control — CMMC practices limiting system access to authorized users, processes, and devices.
Access Control — CMMC practices limiting system access to authorized users, processes, and devices.
Access Control — CMMC practices limiting system access to authorized users, processes, and devices.
Access Control — CMMC practices limiting system access to authorized users, processes, and devices.
Remote access into the environment (VPN, RDP, SSH gateways) is monitored, authenticated with MFA, and tightly controlled.
Remote access is the primary initial-access vector in nation-state actor playbooks.
Access Control — CMMC practices limiting system access to authorized users, processes, and devices.
Access Control — CMMC practices limiting system access to authorized users, processes, and devices.
Access Control — CMMC practices limiting system access to authorized users, processes, and devices.
Access Control — CMMC practices limiting system access to authorized users, processes, and devices.
Access Control — CMMC practices limiting system access to authorized users, processes, and devices.
Access Control — CMMC practices limiting system access to authorized users, processes, and devices.
Access Control — CMMC practices limiting system access to authorized users, processes, and devices.
Access Control — CMMC practices limiting system access to authorized users, processes, and devices.
Security Awareness. This control is tracked in CMMC 2.0 Level 2 but has no plain-language summary in the Polaris catalog yet.
Role-Based Training. This control is tracked in CMMC 2.0 Level 2 but has no plain-language summary in the Polaris catalog yet.
Insider Threat Awareness. This control is tracked in CMMC 2.0 Level 2 but has no plain-language summary in the Polaris catalog yet.
Security-relevant events are logged, retained, and protected from tampering.
Logs are the auditor's primary evidence source. Missing logs during an assessment routinely become automatic findings.
Audit & Accountability — CMMC practices ensuring system activity is logged and accountable.
Audit & Accountability — CMMC practices ensuring system activity is logged and accountable.
Audit & Accountability — CMMC practices ensuring system activity is logged and accountable.
Log review is not one-system-at-a-time — events from different sources are correlated to detect multi-stage attacks.
Modern attacks span identity, endpoint, and network. Siloed log review misses them by design.
Audit & Accountability — CMMC practices ensuring system activity is logged and accountable.
Audit & Accountability — CMMC practices ensuring system activity is logged and accountable.
Audit & Accountability — CMMC practices ensuring system activity is logged and accountable.
Audit & Accountability — CMMC practices ensuring system activity is logged and accountable.
Security Assessments. This control is tracked in CMMC 2.0 Level 2 but has no plain-language summary in the Polaris catalog yet.
Plan of Action. This control is tracked in CMMC 2.0 Level 2 but has no plain-language summary in the Polaris catalog yet.
Security Control Monitoring. This control is tracked in CMMC 2.0 Level 2 but has no plain-language summary in the Polaris catalog yet.
System Security Plan. This control is tracked in CMMC 2.0 Level 2 but has no plain-language summary in the Polaris catalog yet.
Every system class has a documented baseline configuration (OS image, service set, firewall rules), and deviations from the baseline are reviewed.
You cannot detect drift without a baseline to drift from.
Systems are actively kept at their secure configuration — drift is detected and reverted, not just logged.
Static baselines are useless if operators silently loosen them. The 'enforce' verb is deliberate.
Configuration Management — CMMC practices establishing and maintaining secure system configurations.
Configuration Management — CMMC practices establishing and maintaining secure system configurations.
Configuration Management — CMMC practices establishing and maintaining secure system configurations.
Configuration Management — CMMC practices establishing and maintaining secure system configurations.
Systems run only the software and open only the ports they actually need. Everything else is removed or disabled.
Attack surface reduction is cheaper and more durable than detection.
Configuration Management — CMMC practices establishing and maintaining secure system configurations.
Configuration Management — CMMC practices establishing and maintaining secure system configurations.
MFA is required for every privileged account and for every network-level access (including VPN). No exceptions for service accounts without a documented compensating control.
CMMC treats MFA as the minimum acceptable authentication for anything touching CUI.
Identification & Authentication — CMMC practices verifying the identity of users and devices.
Identification & Authentication — CMMC practices verifying the identity of users and devices.
Identification & Authentication — CMMC practices verifying the identity of users and devices.
Passwords meet modern complexity requirements (length > composition), and users cannot cycle back to recently-used passwords.
Weak and reused passwords make MFA fatigue and credential-stuffing attacks trivially successful.
When users change their password, the system prevents them from picking one they have used in the recent past.
Password rotation without reuse prevention is theatre — users rotate between two favorites.
Identification & Authentication — CMMC practices verifying the identity of users and devices.
Identification & Authentication — CMMC practices verifying the identity of users and devices.
Identification & Authentication — CMMC practices verifying the identity of users and devices.
Incident Handling. This control is tracked in CMMC 2.0 Level 2 but has no plain-language summary in the Polaris catalog yet.
Incident Reporting. This control is tracked in CMMC 2.0 Level 2 but has no plain-language summary in the Polaris catalog yet.
Incident Response Testing. This control is tracked in CMMC 2.0 Level 2 but has no plain-language summary in the Polaris catalog yet.
System Maintenance. This control is tracked in CMMC 2.0 Level 2 but has no plain-language summary in the Polaris catalog yet.
Maintenance Controls. This control is tracked in CMMC 2.0 Level 2 but has no plain-language summary in the Polaris catalog yet.
Equipment Sanitization. This control is tracked in CMMC 2.0 Level 2 but has no plain-language summary in the Polaris catalog yet.
Media Inspection. This control is tracked in CMMC 2.0 Level 2 but has no plain-language summary in the Polaris catalog yet.
Nonlocal Maintenance. This control is tracked in CMMC 2.0 Level 2 but has no plain-language summary in the Polaris catalog yet.
Maintenance Personnel. This control is tracked in CMMC 2.0 Level 2 but has no plain-language summary in the Polaris catalog yet.
Media Protection. This control is tracked in CMMC 2.0 Level 2 but has no plain-language summary in the Polaris catalog yet.
Media Access. This control is tracked in CMMC 2.0 Level 2 but has no plain-language summary in the Polaris catalog yet.
Media Markings. This control is tracked in CMMC 2.0 Level 2 but has no plain-language summary in the Polaris catalog yet.
Media Accountability. This control is tracked in CMMC 2.0 Level 2 but has no plain-language summary in the Polaris catalog yet.
Portable Storage Encryption. This control is tracked in CMMC 2.0 Level 2 but has no plain-language summary in the Polaris catalog yet.
Removable Media Control. This control is tracked in CMMC 2.0 Level 2 but has no plain-language summary in the Polaris catalog yet.
Shared Media. This control is tracked in CMMC 2.0 Level 2 but has no plain-language summary in the Polaris catalog yet.
CUI Backup Protection. This control is tracked in CMMC 2.0 Level 2 but has no plain-language summary in the Polaris catalog yet.
Facility Protection. This control is tracked in CMMC 2.0 Level 2 but has no plain-language summary in the Polaris catalog yet.
Alternative Work Sites. This control is tracked in CMMC 2.0 Level 2 but has no plain-language summary in the Polaris catalog yet.
Screen Individuals. This control is tracked in CMMC 2.0 Level 2 but has no plain-language summary in the Polaris catalog yet.
Personnel Actions. This control is tracked in CMMC 2.0 Level 2 but has no plain-language summary in the Polaris catalog yet.
Risk Assessments. This control is tracked in CMMC 2.0 Level 2 but has no plain-language summary in the Polaris catalog yet.
Vulnerability Scanning. This control is tracked in CMMC 2.0 Level 2 but has no plain-language summary in the Polaris catalog yet.
Vulnerability Remediation. This control is tracked in CMMC 2.0 Level 2 but has no plain-language summary in the Polaris catalog yet.
System & Communications Protection — CMMC practices protecting system and communications integrity.
System & Communications Protection — CMMC practices protecting system and communications integrity.
System & Communications Protection — CMMC practices protecting system and communications integrity.
System & Communications Protection — CMMC practices protecting system and communications integrity.
System & Communications Protection — CMMC practices protecting system and communications integrity.
Controlled Unclassified Information is encrypted whenever it crosses a network, using approved cryptographic mechanisms.
Plaintext CUI in transit is an immediate CMMC blocker.
System & Communications Protection — CMMC practices protecting system and communications integrity.
System & Communications Protection — CMMC practices protecting system and communications integrity.
When cryptography is used to protect CUI, the implementation is FIPS 140-2 (or 140-3) validated — not just 'compliant'.
DoD distinguishes 'compliant' (follows the standard) from 'validated' (lab-tested and certificated). Only the latter is acceptable for CUI.
System & Communications Protection — CMMC practices protecting system and communications integrity.
System & Communications Protection — CMMC practices protecting system and communications integrity.
System & Communications Protection — CMMC practices protecting system and communications integrity.
System & Communications Protection — CMMC practices protecting system and communications integrity.
CUI sitting on disk — in databases, file shares, backups, laptops — is encrypted.
Device theft, cloud storage misconfiguration, and backup exposure are all addressed by this single control.
System & Information Integrity — CMMC practices identifying and correcting flaws and protecting against malicious code.
Systems are monitored for attacks and indicators of compromise — not just for uptime.
CMMC assessors look for specific IOC feeds integrated with SIEM.
System & Information Integrity — CMMC practices identifying and correcting flaws and protecting against malicious code.
Compliance Posture
Header metrics reflect evidence-backed CMMC control coverage. Framework rows below separate assessed posture from coverage so failing, partial, and not assessed do not collapse into one number.
Collection Gaps
9
1 unresolved input groups
In-Scope CMMC Controls
110
The control population used for evidence-backed CMMC coverage.
Assessed Coverage
22%
24 assessed / 110 in scope
Assessed Posture
67%
16 passing, 4 partial, 4 failing on the assessed set
Not Assessed
86
Coverage or manual evidence is still missing.
Assessed Posture
67%
Passing 16 • Partial 4 • Failing 4
Not Assessed
86
controlsCoverage or manual evidence is still missing.
PASSING
Evidence-backed.
PARTIAL
Proof gaps remain.
FAILING
Not currently met.
NOT ASSESSED
Coverage missing.
PASSING
Evidence-backed
PARTIAL
Proof gaps remain
FAILING
Not currently met
NOT ASSESSED
Coverage missing
Confidence Context
Coverage
100%
Freshness
May 15, 2026 23:34 UTC
Source
Snapshot-based evidence
Bias / Limits
1 unresolved input groups still drive Not Assessed controls and limit posture certainty.
Framework Workspace
Stay inside the framework that matters for this audience without mixing mapped posture from unrelated standards into the first read.
Stay inside one framework at a time.
Framework View
Each row separates assessed posture from coverage so mapped framework summaries do not overstate certainty.
CMMC L2
24/110 assessed • 86 not assessed
24/110 assessed • 86 not assessed
Coverage
22%
24/110 assessed
Pass rate 67%
CIS Controls v8
18/18 assessed • 0 not assessed
18/18 assessed • 0 not assessed
Coverage
100%
18/18 assessed
Pass rate 50%
NIST CSF
22/23 assessed • 1 not assessed
22/23 assessed • 1 not assessed
Coverage
96%
22/23 assessed
Pass rate 27%
SOC 2
27/33 assessed • 6 not assessed
27/33 assessed • 6 not assessed
Coverage
82%
27/33 assessed
Pass rate 67%
Assessment Gaps
Coverage constraints that explain why some controls remain not assessed.
Collection gap
No live collection or usable manual artifact was available for this input.
Unlocks: the missing evidence needed to move controls out of Not Assessed.
Examples access_review_summary, terms_of_use_summary, lifecycle_summary
9
open gapsDetail Explorer
Evidence-backedBrowse every in-scope control, including not-assessed rows. Open any control for exact evidence detail.
Directory
CMMC L2 110 controlsOne working list for passing, partial, failing, and gap controls.
Showing 110 of 110 controls
Directory
CIS Controls v8 18 controlsOne working list for passing, partial, failing, and gap controls.
Showing 18 of 18 controls
Directory
NIST CSF 23 controlsOne working list for passing, partial, failing, and gap controls.
Showing 23 of 23 controls
Directory
SOC 2 33 controlsOne working list for passing, partial, failing, and gap controls.
Showing 33 of 33 controls
Secondary Support
These mappings show where findings touch frameworks. They do not represent framework posture or pass rates by themselves.
Finding-to-framework mappings
Expand only when you need traceability from a finding to its mapped frameworks.
Traceability support only. A checkmark indicates mapping coverage, not assessed posture.
| Finding ID | Title | Severity | CIS | NIST | SOC2 | ISO | CMMC |
|---|---|---|---|---|---|---|---|
| OnPremInfra-ONPREM-FW-001 | On-Prem: Windows Firewall Disabled on One or More Profiles | Critical | — | check_circle | — | — | check_circle |
| Device-015 | Critical Security Configuration Gaps Require Action | Critical | check_circle | check_circle | check_circle | check_circle | — |
| Network-010 | NSG Rules Allow All Inbound Traffic | Critical | check_circle | check_circle | check_circle | check_circle | — |
| Identity-005 | Legacy Authentication Still Allowed | High | check_circle | check_circle | check_circle | check_circle | — |
| Identity-008 | 40 Users Not Covered by MFA Policy | High | check_circle | check_circle | check_circle | check_circle | — |
| Identity-010 | 2 High-Risk User Accounts Detected | High | check_circle | check_circle | check_circle | check_circle | — |
| Security-001 | 3 Active Security Alerts (2 High, 1 Medium) | High | check_circle | check_circle | check_circle | check_circle | — |
| Email-005 | Safe Links Protection Disabled | High | check_circle | check_circle | check_circle | check_circle | — |
| Email-006 | Safe Attachments Protection Disabled | High | check_circle | check_circle | check_circle | check_circle | — |
| Email-007 | Anti-Phishing Controls Are Not Fully Enabled | High | check_circle | check_circle | check_circle | check_circle | — |
| Email-008 | Email Threat Detection/Containment Rate Is Below Target | High | check_circle | check_circle | check_circle | check_circle | — |
| Identity-014 | FIDO2 / Passkey Authentication Not Enabled | High | check_circle | check_circle | check_circle | check_circle | — |
| Security-002 | Failed and Risky Sign-In Volume Exceeds Baseline | High | check_circle | check_circle | check_circle | check_circle | — |
| Governance-002 | Privileged High-Risk Administrative Operations Require Review | High | check_circle | check_circle | check_circle | check_circle | — |
| DataProtection-010 | SharePoint External Sharing Is Enabled on Collaboration Sites | High | check_circle | check_circle | check_circle | check_circle | — |
| Governance-003 | Secure Score Recommendation Backlog Is Accumulating | High | check_circle | check_circle | check_circle | check_circle | — |
| Application-006 | Third-Party Application Consents Include Elevated-Risk Integrations | High | check_circle | check_circle | check_circle | check_circle | — |
| Identity-017 | Strong Authentication Method Adoption Is Below Target | High | check_circle | check_circle | check_circle | check_circle | — |
| Security-003 | Threat Pulse Indicates Elevated Active Alert Backlog | High | check_circle | check_circle | check_circle | check_circle | — |
| Infrastructure-001 | Network Security Groups Allow Unrestricted Inbound Access | High | check_circle | check_circle | check_circle | check_circle | — |
| Infrastructure-002 | Storage Accounts Allow Public Blob Access | High | check_circle | check_circle | check_circle | check_circle | — |
| Vulnerability-001 | Security Configuration Gaps Require Remediation | High | check_circle | check_circle | check_circle | check_circle | — |
| Vulnerability-002 | High-Severity Vulnerabilities Require Short-Term Remediation | High | check_circle | check_circle | check_circle | check_circle | — |
| Cost-001 | Orphaned Cloud Resources Incurring Waste | High | check_circle | check_circle | check_circle | check_circle | — |
| ActiveDirectory-003 | AD: Privileged Admin Footprint Controlled | High | check_circle | check_circle | check_circle | check_circle | — |
| ActiveDirectory-006 | AD: LDAP Signing/Channel Binding Gap | High | check_circle | check_circle | check_circle | check_circle | — |
| OnPremInfra-ONPREM-FW-003 | On-Prem: RDP Exposed Broadly Across Networks | High | — | check_circle | — | — | check_circle |
| OnPremInfra-ONPREM-NET-001 | On-Prem: High-Risk Listening Ports Exposed | High | — | check_circle | — | — | check_circle |
| OnPremInfra-ONPREM-EP-005 | On-Prem: Windows Update Not Configured or Current | High | — | check_circle | — | — | check_circle |
| OnPremInfra-ONPREM-CERT-001 | On-Prem: Certificates Expiring Within 30 Days | High | — | check_circle | — | — | check_circle |
| OnPremInfra-ONPREM-AD-011 | On-Prem: Password Policy Below Minimum Strength | High | — | check_circle | — | — | check_circle |
| Identity-025 | Too Many Global Administrators | High | check_circle | check_circle | check_circle | check_circle | — |
| Identity-026 | PIM Not Utilized for Privileged Roles | High | check_circle | check_circle | check_circle | check_circle | — |
| Identity-027 | Legacy Authentication Sign-Ins Detected | High | check_circle | check_circle | check_circle | check_circle | — |
| Device-010 | Managed Devices Missing Disk Encryption | High | check_circle | check_circle | check_circle | check_circle | — |
| Device-013 | No Device Compliance Policies Defined | High | check_circle | check_circle | check_circle | check_circle | — |
| Device-016 | High Endpoint Vulnerability Backlog | High | check_circle | check_circle | check_circle | check_circle | — |
| DataProtection-013 | No DLP Policies Configured | High | check_circle | check_circle | check_circle | check_circle | — |
| DataProtection-017 | Excessive Third-Party App Permissions | High | check_circle | check_circle | check_circle | check_circle | — |
| Network-013 | Sensitive Email Encryption Not Enabled | High | check_circle | check_circle | check_circle | check_circle | — |
| Email-009 | External Email Forwarding Rules Detected | High | check_circle | check_circle | check_circle | check_circle | — |
| Email-012 | No Outbound Spam Policy Enabled | High | check_circle | check_circle | check_circle | check_circle | — |
| Email-013 | Mail Flow Rules Bypass Security Filtering | High | check_circle | check_circle | check_circle | check_circle | — |
| Email-014 | Auto-Forward to External Addresses Detected | High | check_circle | check_circle | check_circle | check_circle | — |
| Email-016 | Multiple Domains Without DMARC | High | check_circle | check_circle | check_circle | check_circle | — |
| Endpoint-007 | Managed Devices Missing BitLocker or Device Encryption | High | check_circle | check_circle | check_circle | check_circle | — |
| Endpoint-011 | Defender Tamper Protection Disabled | High | check_circle | check_circle | check_circle | check_circle | — |
| Endpoint-013 | Unsupported Operating Systems in Managed Fleet | High | check_circle | check_circle | check_circle | check_circle | — |
| Identity-018 | Privileged Identity Management Not Protecting Admin Roles | High | check_circle | check_circle | check_circle | check_circle | — |
| Identity-020 | Risky Sign-Ins Not Investigated | High | check_circle | check_circle | check_circle | check_circle | — |
Appendix
Secondary reference material for assessability rules, input coverage, and existing POA&M items.
Evidence supports implementation of the requirement.
Some implementation exists, but proof or execution gaps remain.
Evidence shows the requirement is not currently met.
Evidence was not sufficient to determine implementation.
License gap
Required licensing or product capability was not available for collection.
Consent missing
Tenant consent or connector authorization blocked automated collection.
Collection failure
Automated collection failed or returned unusable results.
Manual review required
This requirement depends on document or interview evidence, not just telemetry.
Out of scope
The source input is not applicable to the scoped environment.
Collection gap
No live collection or usable manual artifact was available for this input.
| Dataset | State | Reason | Last Collected |
|---|---|---|---|
| access_review_summary | Gap | Collection gap | — |
| pim_role_settings | Assessed | Assessed | — |
| directory_roles | Assessed | Assessed | — |
| terms_of_use_summary | Gap | Collection gap | — |
| lifecycle_summary | Gap | Collection gap | — |
| sharepoint_sharing_settings | Gap | Collection gap | — |
| teams_policies | Assessed | Assessed | — |
| bitlocker_recovery_keys | Gap | Collection gap | — |
| records_management | Assessed | Assessed | — |
| retention_policies | Assessed | Assessed | — |
| data_governance_summary | Gap | Collection gap | — |
| risk_detection_summary | Gap | Collection gap | — |
| entra_recommendations | Gap | Collection gap | — |
| ca_whatif_results | Gap | Collection gap | — |
| arm_network_nsgs | Assessed | Assessed | — |
| arm_storage_accounts | Assessed | Assessed | — |
| arm_key_vaults | Assessed | Assessed | — |
| arm_sql_servers | Assessed | Assessed | — |
| ID | Weakness | Milestone |
|---|---|---|
| AC.L2-3.1.6 | Non-Privileged Account Use | 180 days |
| SC.L2-3.13.2 | Security Engineering | 180 days |
| AU.L2-3.3.4 | Audit Failure Alerting | 180 days |
| CM.L2-3.4.5 | Access Restrictions for Change | 180 days |
The bundle is a signed, deterministic artifact. Any reviewer can reproduce the manifest root offline and compare the signature against the — printed in the masthead of every page. No Polaris backend required.
# verify-it-yourself · bundle signature + manifest integrity
polaris verify ./polaris-20260515T233445Z_ad-hoc.tar.zst \
--pubkey polaris-signing.pub \
--expect-sig —
# expected output
[ok] signature verified
[ok] manifest_root match
[ok] envelopes 165 / 165 hashes match
[ok] collectors 5 / 5 at pinned versions
[ok] chain_of_custody collect → normalize → hash → bundle → sign → publishThese cards explain what fed the report, which permissions constrained collection, and how much of the evidence is directly observed versus inferred.
Method Upload `Invoke-ScubaGearCollector.ps1` output
Coverage Microsoft 365 baseline hardening findings and federal-baseline appendix material
Feeds Findings · Measurement Map · Federal Baseline appendix (Word)
Next action Run ScubaGear if you need Microsoft 365 baseline policy proof beyond native Graph coverage.
Method Automatic after Azure RBAC Reader is granted on each subscription
Coverage Azure infrastructure, exposure, key vault, SQL, backup, and recovery posture
Feeds Azure Infrastructure and ARM Coverage · Coverage Unlock Matrix · Measurement Map
Next action Keep subscription Reader scope current and validate accessible subscriptions before release.
Method Automatic after Graph admin consent
Coverage Identity, endpoint, collaboration, security, and permission telemetry
Feeds Overview KPIs · Findings · Measurement Map · Permission Collection Status · Coverage Unlock Matrix
Next action Use as the primary cloud evidence lane for this report.
Method Upload `Invoke-ADOnPremCollector.ps1` output
Coverage Tier-0 groups, LDAP signing, NTLM, trusts, ACLs, and on-prem AD hygiene
Feeds On-Prem Active Directory Assessment · Tier-0 Privileged Groups · Coverage Unlock Matrix · Measurement Map
Next action Treat this as the authoritative lane for the dedicated on-prem AD report sections.
Method Upload `Invoke-SecurityCollection.ps1` output
Coverage AD, firewall, endpoint, audit, backup, and certificate evidence for compliance scoring
Feeds CMMC Evidence Snapshot · Evidence Summary · Coverage Unlock Matrix · Measurement Map
Next action Use this lane for evidence-backed compliance coverage, not for dedicated AD narrative sections.
| Endpoint | Permission | Domain | Status |
|---|---|---|---|
| Device Compliance | DeviceManagementManagedDevices.Read.All | Endpoint | granted_and_pulled |
| Risky Users | IdentityRiskyUser.Read.All | Identity | granted_and_pulled |
| Conditional Access | Policy.Read.All | Identity | granted_and_pulled |
| Backup Health | Reader (ARM) | Infrastructure | granted_and_pulled |
| Backup Jobs | Reader (ARM) | Infrastructure | granted_and_pulled |
| Backup Vaults | Reader (ARM) | Infrastructure | granted_and_pulled |
| Key Vaults | Reader (ARM) | Infrastructure | granted_and_pulled |
| Network Security Groups | Reader (ARM) | Network | granted_and_pulled |
| Recovery Readiness | Reader (ARM) | Infrastructure | granted_and_pulled |
| SQL Servers | Reader (ARM) | Infrastructure | granted_and_pulled |
| Storage Accounts | Reader (ARM) | Infrastructure | granted_and_pulled |
| MFA Coverage | Reports.Read.All | Identity | granted_and_pulled |
| Privileged Accounts | RoleManagement.Read.All | Identity | granted_and_pulled |
| Secure Score | SecurityEvents.Read.All | Security | granted_and_pulled |
| Secure Score Controls | SecurityEvents.Read.All | Security | granted_and_pulled |
| Security Alerts | SecurityEvents.Read.All | Security | granted_and_pulled |
| Vulnerability Assessment | SecurityEvents.Read.All | Vulnerability Management | granted_and_pulled |
| Defender TVM Recommendations | SecurityRecommendation.Read.All (WindowsDefenderATP) | Vulnerability Management | granted_and_pulled |
| Defender Software Inventory | Software.Read.All (WindowsDefenderATP) | Vulnerability Management | granted_and_pulled |
| User Summary | User.Read.All | Identity | granted_and_pulled |
| Defender TVM Vulnerabilities | Vulnerability.Read.All (WindowsDefenderATP) | Vulnerability Management | granted_and_pulled |
| Metric | Source | Permission | Confidence |
|---|---|---|---|
| — | Microsoft Graph Reports | Reports.Read.All | OBSERVED |
| — | Microsoft Graph Reports | Reports.Read.All | OBSERVED |
| — | Microsoft Graph Policies | Policy.Read.All | OBSERVED |
| — | Microsoft Graph Conditional Access | Policy.Read.All | OBSERVED |
| — | Identity Protection | IdentityRiskEvent.Read.All | OBSERVED |
| — | Microsoft Defender Secure Score | SecurityEvents.Read.All | OBSERVED |
| — | Microsoft Intune | DeviceManagementManagedDevices.Read.All | OBSERVED |
| Collector | Scope | Host | Runtime | Records | Module hash | Status |
|---|---|---|---|---|---|---|
| network.topologyv1.0.0 | on-prem | DAL-DC01.corp.contoso.local | 0.0s | 31 | — | failed output |
| ad.tier_0v1.0.0 | on-prem | DAL-DC01.corp.contoso.local | 0.0s | 6 | — | failed output |
| ad.attack_pathv1.0.0 | on-prem | DAL-DC01.corp.contoso.local | 0.0s | 24 | — | failed output |
| adcs.pkiv1.0.0 | on-prem | DAL-CA01.corp.contoso.local | 0.0s | 10 | — | failed output |
| gpo.securityv1.0.0 | on-prem | DAL-DC01.corp.contoso.local | 0.0s | 7 | — | failed output |
artifact: On-Prem: Windows Firewall Disabled on One or More Profiles.txt type: collected bytes: 0 sha256: —
artifact: Critical Security Configuration Gaps Require Action.txt type: collected bytes: 0 sha256: —
artifact: NSG Rules Allow All Inbound Traffic.txt type: collected bytes: 0 sha256: —
artifact: Legacy Authentication Still Allowed.txt type: collected bytes: 0 sha256: —
artifact: 40 Users Not Covered by MFA Policy.txt type: collected bytes: 0 sha256: —
artifact: 2 High-Risk User Accounts Detected.txt type: collected bytes: 0 sha256: —
artifact: 3 Active Security Alerts (2 High, 1 Medium).txt type: collected bytes: 0 sha256: —
artifact: Safe Links Protection Disabled.txt type: collected bytes: 0 sha256: —
artifact: Safe Attachments Protection Disabled.txt type: collected bytes: 0 sha256: —
artifact: Anti-Phishing Controls Are Not Fully Enabled.txt type: collected bytes: 0 sha256: —
artifact: Email Threat Detection/Containment Rate Is Below Target.txt type: collected bytes: 0 sha256: —
artifact: FIDO2 / Passkey Authentication Not Enabled.txt type: collected bytes: 0 sha256: —
Tenant Identity and Consent Completeness
Use this workspace to verify tenant identity, consent completeness, and the current telemetry baseline before digging into the detailed evidence sections below.
Tenant Name
Contoso Defense Systems
Tenant ID
a1b2c3d4-e5f6-7890-abcd-ef1234567890
Consent Completeness
Consent completeness: Complete (11/11 report-scope permissions granted and collected).
Coverage Unlock
Expand Assessment Coverage
Grant additional Microsoft 365 permissions to unlock more data sources and deeper analysis.
Tenant Baseline
This baseline should orient the rest of the evidence tab.
Total Users
150
Admins
7
Managed Devices
150
Secure Score
56.7%
MFA Coverage
94.0%
Verified Domains
3
User MFA
94.0%
Admin MFA
100.0%
Users With MFA
0
Users Without MFA
0
Total Endpoints
49
Successful
49
Failed
0
| Endpoint | Status | Objects | Permission |
|---|---|---|---|
| Secure Score | Collected | — | SecurityEvents.Read.All |
| MFA Coverage | Collected | — | Reports.Read.All |
| Risky Users | Collected | — | IdentityRiskyUser.Read.All |
| Privileged Accounts | Collected | — | RoleManagement.Read.All |
| Conditional Access | Collected | — | Policy.Read.All |
| Device Compliance | Collected | — | DeviceManagementManagedDevices.Read.All |
| Security Alerts | Collected | — | SecurityEvents.Read.All |
| User Summary | Collected | — | User.Read.All |
| Secure Score Controls | Collected | — | SecurityEvents.Read.All |
| Network Security Groups | Collected | — | Reader (ARM) |
| Storage Accounts | Collected | — | Reader (ARM) |
| Key Vaults | Collected | — | Reader (ARM) |
| SQL Servers | Collected | — | Reader (ARM) |
| Backup Health | Collected | — | Reader (ARM) |
| Backup Vaults | Collected | — | Reader (ARM) |
| Backup Jobs | Collected | — | Reader (ARM) |
| Recovery Readiness | Collected | — | Reader (ARM) |
| Vulnerability Assessment | Collected | — | SecurityEvents.Read.All |
| Defender TVM Vulnerabilities | Collected | — | Vulnerability.Read.All (WindowsDefenderATP) |
| Defender TVM Recommendations | Collected | — | SecurityRecommendation.Read.All (WindowsDefenderATP) |
| Defender Software Inventory | Collected | — | Software.Read.All (WindowsDefenderATP) |
Collection Paths
5
Collected
4
Partial
0
Not Collected
1
This is the direct operator answer to "where does the data go?" Each collection lane lists the report sections it feeds and the next action needed to improve coverage.
Microsoft Graph API
Automatic after Graph admin consent
What It Feeds
Identity, endpoint, collaboration, security, and permission telemetry
21/21 endpoint checks returned cloud telemetry.
Report Sections
Next Action
Use as the primary cloud evidence lane for this report.
Azure Resource Manager (Reader RBAC)
Automatic after Azure RBAC Reader is granted on each subscription
What It Feeds
Azure infrastructure, exposure, key vault, SQL, backup, and recovery posture
ARM collection not enabled
Report Sections
Next Action
Keep subscription Reader scope current and validate accessible subscriptions before release.
PowerShell Security Collection Upload
Upload `Invoke-SecurityCollection.ps1` output
Modules: ActiveDirectory, NetworkFirewall, EndpointSecurity, AuditConfig, BackupStatus, CertificateStore
What It Feeds
AD, firewall, endpoint, audit, backup, and certificate evidence for compliance scoring
24 evidence-backed controls across 14 evidence domains.
Report Sections
Next Action
Use this lane for evidence-backed compliance coverage, not for dedicated AD narrative sections.
On-Prem AD Collector
Upload `Invoke-ADOnPremCollector.ps1` output
What It Feeds
Tier-0 groups, LDAP signing, NTLM, trusts, ACLs, and on-prem AD hygiene
0 on-prem AD coverage items landed in the dedicated AD/Tier-0 path.
Report Sections
Next Action
Treat this as the authoritative lane for the dedicated on-prem AD report sections.
CISA ScubaGear Collector
Upload `Invoke-ScubaGearCollector.ps1` output
What It Feeds
Microsoft 365 baseline hardening findings and federal-baseline appendix material
No Scuba baseline upload was detected in this run.
Report Sections
Next Action
Run ScubaGear if you need Microsoft 365 baseline policy proof beyond native Graph coverage.
Subscription scope, infrastructure coverage, and recovery evidence stay separate here so Azure posture is not overstated.
ARM Access Model
Azure RBAC on each customer subscription is required before infrastructure posture can be treated as complete.
Required Role
Reader
Accessible Subscriptions
0
Collection Failures
0
Subscriptions
0
NSGs
1
Storage
1
Key Vaults
1
Public IPs
2
ARM collection not enabled
ARM Subscription Scope
| Subscription | Subscription ID | State |
|---|---|---|
| No Azure subscriptions were enumerated in this run. Grant Reader on each target subscription before treating Azure posture as complete. | ||
ARM Security Summary
Network Security Groups
| Name | Resource Group | Rules Count |
|---|---|---|
| nsg-edge-westus2 | — | — |
Key Vaults
| Name | Resource Group | SKU |
|---|---|---|
| kv-prod | — | — |
SQL Servers
| Name | Resource Group | State |
|---|---|---|
| sql-prod | — | — |
Storage Accounts
| Name | Resource Group | Kind |
|---|---|---|
| stapp01 | — | — |
Public IPs
| Name | IP Address | Allocation |
|---|---|---|
| — | 52.160.14.27 | — |
| — | 20.45.71.11 | — |
Backup Vaults
| Name | Resource Group | Type |
|---|---|---|
| contoso-rsv-prod-eastus | rg-backup-prod | — |
| contoso-rsv-dr-westus | rg-backup-dr | — |
Backup Jobs
| Name | Status | Start Time |
|---|---|---|
| — | Completed | 2026-05-15T20:09:51.299207+00:00 |
| — | Completed | 2026-05-15T19:29:51.299207+00:00 |
| — | Completed | 2026-05-15T18:24:51.299207+00:00 |
Recovery Readiness
Device Compliance
150 managed devices
96.7%
Total
150
Compliant
145
Non-Compliant
4
Device Inventory Detail
| Device | OS | Status |
|---|---|---|
| — | Windows | — |
| — | macOS | — |
| — | iOS | — |
| — | Total | — |
No data collected for Privileged Accounts.
Total Policies
12
Enforced
0
Report Only
0
Disabled
0
Domain
—
AD Score
0.0
Domain Controllers
Tier 0 Groups
| Control | Status | Severity |
|---|---|---|
| AD Connect Sync Healthy | Pass | High |
| Legacy Authentication Active | Fail | High |
| Privileged Admin Footprint Controlled | Partial | Medium |
| Brute-Force Activity Monitored | Pass | High |
| Risky Sign-In Pressure Controlled | Pass | Medium |
| LDAP Signing/Channel Binding Gap | Fail | High |
| NTLMv1 Disabled | Pass | Medium |
| Domain Controller Patch Baseline Gap | Partial | High |
Static map of the on-prem Active Directory forest assembled from the PowerShell collector bundles. Sites sit on the top band, domain controllers below them, certificate authorities across the bottom. Crimson halos mark nodes carrying open findings; a gold ring marks Global Catalog DCs; dashed crimson arcs flag trusts with SID filtering disabled.
View the interactive tactical map →Sites
4
Domain Controllers
9
Certificate Authorities
2
Trusts
4
Findings
25
Total Risky
0
High Risk
0
Medium Risk
0
| User | Risk Level | Detail |
|---|---|---|
| Marcus Williams | High | — |
| Jennifer Park | High | — |
| Emily Rodriguez | Medium | — |
| James Okafor | Medium | — |
| Rachel Kim | Medium | — |
| Thomas Bergstrom | Low | — |
External Guest Summary
Total Guests
30
Inactive Guests
0
Assessed
29/41
Not Assessed
8
Not Consented
4
| Dataset Key | Dataset Name | Domain | Status | Next Action |
|---|---|---|---|---|
| oauth_grants_summary | OAuth Permission Grants | Identity / Apps | Assessed | Review findings |
| oauth_risk | OAuth App Permissions | Identity / Apps | Assessed | Review findings |
| log_analytics_summary | Log Analytics / Sentinel | Monitoring | Assessed | Review findings |
| service_principal_summary | Service Principal Audit | Identity / Apps | Assessed | Review findings |
| sharepoint_sites | SharePoint Sites (Raw) | Collaboration / Data | Assessed | Review findings |
| sharepoint_summary | SharePoint Summary | Collaboration / Data | Assessed | Review findings |
| sharepoint_sharing_settings | SharePoint Sharing Settings | Collaboration / Data | Not Consented | Grant consent |
| teams_inventory_summary | Teams Inventory | Collaboration | Assessed | Review findings |
| teams_summary | Teams Summary | Collaboration | Assessed | Review findings |
| named_locations_summary | Named Locations | Identity | Assessed | Review findings |
| sign_in_summary | Sign-In Analysis | Identity | Assessed | Review findings |
| retention_policies | Retention Policies | Data Protection | Assessed | Review findings |
| admin_operations_summary | High-Risk Admin Operations | Monitoring | Assessed | Review findings |
| high_risk_operations | High-Risk Operations Timeline | Monitoring | Assessed | Review findings |
| arm_public_ips | ARM Public IP Inventory | Infrastructure | Assessed | Review findings |
| configuration_status | Assessment Configuration Health | Platform | Not Assessed | Enable collection |
| secure_score_recommendations | Secure Score Recommendations | Security | Assessed | Review findings |
| vulnerability_data | Vulnerability Evidence (Detailed) | Endpoint | Assessed | Review findings |
| vulnerability_summary | Vulnerability Summary | Endpoint | Assessed | Review findings |
| guest_users_list | Guest Users | Identity / Collaboration | Assessed | Review findings |
| backup_health | Backup Security Posture | Resilience | Assessed | Review findings |
| backup_jobs | Backup Jobs | Resilience | Assessed | Review findings |
| backup_vaults | Backup Vaults | Resilience | Assessed | Review findings |
| recovery_readiness | Recovery Readiness | Resilience | Assessed | Review findings |
| bitlocker_recovery_keys | BitLocker Recovery Key Coverage | Endpoint | Not Consented | Grant consent |
| exchange_transport_rules | Exchange Transport Rules | Not Consented | Grant consent | |
| intune_app_protection | Intune App Protection | Endpoint | Assessed | Review findings |
| managed_app_policies | Managed App Policies | Endpoint | Assessed | Review findings |
| pim_role_settings | PIM Role Settings | Identity | Assessed | Review findings |
| teams_policies | Teams Policies | Collaboration | Assessed | Review findings |
| defender_tvm_detail | Defender TVM — CVE Detail | Vulnerability | Not Assessed | Enable collection |
| attack_simulation_campaigns | Attack Simulation Campaigns | Awareness | Not Assessed | Enable collection |
| auth_methods_policy | Authentication Methods Policy | Identity | Assessed | Review findings |
| device_posture_rollup | Device Posture Rollup | Endpoint | Assessed | Review findings |
| purview_labels | Purview Sensitivity Labels | Data Protection | Not Assessed | Enable collection |
| purview_policies | Purview DLP Policies | Data Protection | Not Assessed | Enable collection |
| accesspackage_summary | Entra Access Package Summary | Identity Governance | Not Assessed | Enable collection |
| entitlement_reviews | Entitlement Reviews | Identity Governance | Not Assessed | Enable collection |
| entra_recommendations | Entra Recommendations | Identity | Not Consented | Grant consent |
| lifecycle_summary_deep | Entra Lifecycle Workflows — Detail | Identity Governance | Not Assessed | Enable collection |
| onprem_operations | On-Prem Operations (Collector Bundles) | On-Prem Infrastructure | Assessed | Review findings |
No data collected for Security Feature Scorecard.
All permissions are granted. No coverage gaps detected.
Granted
21
Not Granted
0
| Endpoint | Permission | Status | Domain |
|---|---|---|---|
| Device Compliance | DeviceManagementManagedDevices.Read.All | Granted + Pulled | Endpoint |
| Risky Users | IdentityRiskyUser.Read.All | Granted + Pulled | Identity |
| Conditional Access | Policy.Read.All | Granted + Pulled | Identity |
| Backup Health | Reader (ARM) | Granted + Pulled | Infrastructure |
| Backup Jobs | Reader (ARM) | Granted + Pulled | Infrastructure |
| Backup Vaults | Reader (ARM) | Granted + Pulled | Infrastructure |
| Key Vaults | Reader (ARM) | Granted + Pulled | Infrastructure |
| Network Security Groups | Reader (ARM) | Granted + Pulled | Network |
| Recovery Readiness | Reader (ARM) | Granted + Pulled | Infrastructure |
| SQL Servers | Reader (ARM) | Granted + Pulled | Infrastructure |
| Storage Accounts | Reader (ARM) | Granted + Pulled | Infrastructure |
| MFA Coverage | Reports.Read.All | Granted + Pulled | Identity |
| Privileged Accounts | RoleManagement.Read.All | Granted + Pulled | Identity |
| Secure Score | SecurityEvents.Read.All | Granted + Pulled | Security |
| Secure Score Controls | SecurityEvents.Read.All | Granted + Pulled | Security |
| Security Alerts | SecurityEvents.Read.All | Granted + Pulled | Security |
| Vulnerability Assessment | SecurityEvents.Read.All | Granted + Pulled | Vulnerability Management |
| Defender TVM Recommendations | SecurityRecommendation.Read.All (WindowsDefenderATP) | Granted + Pulled | Vulnerability Management |
| Defender Software Inventory | Software.Read.All (WindowsDefenderATP) | Granted + Pulled | Vulnerability Management |
| User Summary | User.Read.All | Granted + Pulled | Identity |
| Defender TVM Vulnerabilities | Vulnerability.Read.All (WindowsDefenderATP) | Granted + Pulled | Vulnerability Management |
Azure Resource Manager
ARM subscription security, public IPs, and resource inventory
Azure Backup & DR
Backup vaults, job status, and recovery readiness
Defender Vulnerability
Secure Score configuration recommendations; Defender TVM CVE data not collected
Microsoft Purview
DLP policies, retention, and compliance posture
Log Analytics / Sentinel
Log ingestion, workspace health, and SIEM coverage
| Property | Value |
|---|---|
| Tenant ID | a1b2c3d4-e5f6-7890-abcd-ef1234567890 |
| Tenant Name | Contoso Defense Systems |
| Primary Domains | contoso.onmicrosoft.com, contoso.com, contoso.mail.onmicrosoft.com |
| Run ID | 20260515T233445Z_ad-hoc |
| Collector Version | fffea76 |
| SKU Name | Assigned | Total | Utilization |
|---|---|---|---|
| SPB | 120 | 130 | 92.3% |
| EXCHANGESTANDARD | 5 | 5 | 100.0% |
| FLOW_FREE | 28 | 10000 | 0.3% |
| POWER_BI_STANDARD | 4 | 50 | 8.0% |
| Metric | Data Source | Permission Required | Confidence |
|---|---|---|---|
| MFA coverage % | Microsoft Graph Reports | Reports.Read.All | Observed |
| Admin MFA coverage % | Microsoft Graph Reports | Reports.Read.All | Observed |
| Legacy auth blocked | Microsoft Graph Policies | Policy.Read.All | Observed |
| Enabled CA policy count | Microsoft Graph Conditional Access | Policy.Read.All | Observed |
| Risky sign-ins (count) | Identity Protection | IdentityRiskEvent.Read.All | Observed |
| Secure Score % | Microsoft Defender Secure Score | SecurityEvents.Read.All | Observed |
| Device compliance % | Microsoft Intune | DeviceManagementManagedDevices.Read.All | Observed |
Collected
60
Missing
2
Total Audited
62
Data Collected
Data Missing
{
"_html_security": {"type": "dict", "size": "3 keys"}
"_report_mode": {"type": "str", "size": "11 chars"}
"accesspackage_summary": {"type": "dict", "size": "0 keys"}
"action_items": {"type": "list", "size": "11 items"}
"ad_action_plan": {"type": "list", "size": "4 items"}
"ad_assessment_available": {"type": "bool", "size": "bool"}
"ad_collection_status": {"type": "str", "size": "0 chars"}
"ad_connect_health": {"type": "dict", "size": "4 keys"}
"ad_controls": {"type": "list", "size": "8 items"}
"ad_coverage_items": {"type": "list", "size": "0 items"}
"ad_domain_controllers": {"type": "list", "size": "3 items"}
"ad_findings": {"type": "list", "size": "3 items"}
"ad_kerberos": {"type": "dict", "size": "3 keys"}
"ad_ldap_signing": {"type": "dict", "size": "2 keys"}
"ad_metrics": {"type": "dict", "size": "6 keys"}
"ad_ntlm_telemetry": {"type": "dict", "size": "3 keys"}
"ad_security_score": {"type": "dict", "size": "6 keys"}
"ad_tier0_groups": {"type": "list", "size": "7 items"}
"ad_trusts": {"type": "list", "size": "0 items"}
"admin_operations_summary": {"type": "dict", "size": "5 keys"}
"app_registrations_summary": {"type": "dict", "size": "14 keys"}
"arm_collection_status": {"type": "SafeString", "size": "12 chars"}
"arm_diagnostic_settings": {"type": "dict", "size": "1 keys"}
"arm_key_vaults": {"type": "list", "size": "1 items"}
"arm_network_nsgs": {"type": "list", "size": "1 items"}
"arm_policy_assignments": {"type": "dict", "size": "1 keys"}
"arm_private_endpoints": {"type": "dict", "size": "0 keys"}
"arm_public_ips": {"type": "list", "size": "2 items"}
"arm_public_paas_count": {"type": "int", "size": "int"}
"arm_resource_tags": {"type": "dict", "size": "1 keys"}
"arm_security_summary": {"type": "dict", "size": "3 keys"}
"arm_sql_servers": {"type": "list", "size": "1 items"}
"arm_storage_accounts": {"type": "list", "size": "1 items"}
"artifact_contract_validation": {"type": "dict", "size": "4 keys"}
"artifacts": {"type": "list", "size": "0 items"}
"assessment_period": {"type": "dict", "size": "2 keys"}
"assessment_ready": {"type": "bool", "size": "bool"}
"assessment_ref": {"type": "SafeString", "size": "36 chars"}
"attack_simulation_campaigns": {"type": "dict", "size": "0 keys"}
"auth_methods_detail": {"type": "dict", "size": "4 keys"}
"auth_methods_policy": {"type": "dict", "size": "5 keys"}
"auth_methods_summary": {"type": "dict", "size": "4 keys"}
"backup_dashboard": {"type": "dict", "size": "8 keys"}
"backup_health": {"type": "dict", "size": "4 keys"}
"backup_jobs": {"type": "list", "size": "3 items"}
"backup_status": {"type": "dict", "size": "0 keys"}
"backup_vaults": {"type": "list", "size": "2 items"}
"baseline_gap_actions": {"type": "list", "size": "1 items"}
"baseline_metrics": {"type": "dict", "size": "16 keys"}
"bitlocker_recovery_keys": {"type": "dict", "size": "3 keys"}
"branding": {"type": "dict", "size": "11 keys"}
"ca_gap_analysis": {"type": "dict", "size": "5 keys"}
"ca_mfa_coverage": {"type": "dict", "size": "8 keys"}
"ca_policy_summary": {"type": "dict", "size": "5 keys"}
"ca_whatif_results": {"type": "dict", "size": "5 keys"}
"cis_v8_assessment": {"type": "dict", "size": "5 keys"}
"collection_gaps": {"type": "dict", "size": "8 keys"}
"collection_health_summary": {"type": "dict", "size": "12 keys"}
"combined_posture": {"type": "dict", "size": "8 keys"}
"compliance_context": {"type": "dict", "size": "5 keys"}
"compliance_data_quality": {"type": "dict", "size": "5 keys"}
"compliance_decision_queue": {"type": "list", "size": "10 items"}
"compliance_denominators": {"type": "dict", "size": "6 keys"}
"compliance_evidence_inventory": {"type": "list", "size": "18 items"}
"compliance_framework_controls": {"type": "dict", "size": "4 keys"}
"compliance_policies_summary": {"type": "dict", "size": "3 keys"}
"compliance_probe_audit": {"type": "list", "size": "18 items"}
"compliance_probe_audit_summary": {"type": "dict", "size": "6 keys"}
"composite_rating": {"type": "dict", "size": "8 keys"}
"conditional_access": {"type": "dict", "size": "6 keys"}
"configuration_status": {"type": "dict", "size": "0 keys"}
"consent_completeness": {"type": "dict", "size": "6 keys"}
"consent_completeness_line": {"type": "SafeString", "size": "86 chars"}
"contract_contradiction_dashboard": {"type": "dict", "size": "3 keys"}
"contradiction_dashboard": {"type": "dict", "size": "3 keys"}
"cost_summary": {"type": "dict", "size": "6 keys"}
"current_permission_health": {"type": "dict", "size": "8 keys"}
"data_governance_summary": {"type": "dict", "size": "8 keys"}
"data_quality_by_domain": {"type": "list", "size": "11 items"}
"data_quality_gate": {"type": "dict", "size": "4 keys"}
"data_status_semantics": {"type": "dict", "size": "3 keys"}
"decision_points": {"type": "list", "size": "1 items"}
"defender_summary": {"type": "dict", "size": "7 keys"}
"defender_tvm_detail": {"type": "dict", "size": "0 keys"}
"device_compliance": {"type": "dict", "size": "14 keys"}
"device_configuration_policies": {"type": "dict", "size": "5 keys"}
"device_inventory": {"type": "list", "size": "4 items"}
"device_inventory_footnote": {"type": "SafeString", "size": "34 chars"}
"device_posture_rollup": {"type": "dict", "size": "6 keys"}
"directory_roles": {"type": "dict", "size": "3 keys"}
"dlp_summary": {"type": "dict", "size": "4 keys"}
"domain_stats": {"type": "dict", "size": "11 keys"}
"domain_validations": {"type": "dict", "size": "7 keys"}
"email_security": {"type": "dict", "size": "27 keys"}
"entitlement_reviews": {"type": "dict", "size": "0 keys"}
"entra_recommendations": {"type": "dict", "size": "6 keys"}
"environment_snapshot": {"type": "dict", "size": "10 keys"}
"evidence_assessment_available": {"type": "bool", "size": "bool"}
"evidence_assessment_results": {"type": "dict", "size": "6 keys"}
"evidence_controls": {"type": "list", "size": "24 items"}
"evidence_coverage": {"type": "dict", "size": "7 keys"}
"evidence_domain_rollup": {"type": "dict", "size": "14 keys"}
"evidence_findings": {"type": "list", "size": "8 items"}
"evidence_manifest": {"type": "dict", "size": "1 keys"}
"evidence_poam": {"type": "list", "size": "4 items"}
"evidence_sprs_score": {"type": "dict", "size": "4 keys"}
"exchange_transport_rules": {"type": "dict", "size": "4 keys"}
"expanded_domain_rollup": {"type": "dict", "size": "17 keys"}
"failed_endpoints": {"type": "list", "size": "0 items"}
"findings": {"type": "list", "size": "164 items"}
"findings_by_domain": {"type": "dict", "size": "11 keys"}
"findings_generation_status": {"type": "SafeString", "size": "2 chars"}
"generated_at": {"type": "SafeString", "size": "32 chars"}
"guest_detail_inventory": {"type": "dict", "size": "3 keys"}
"guest_summary": {"type": "dict", "size": "11 keys"}
"guest_users_list": {"type": "list", "size": "5 items"}
"high_risk_operations": {"type": "dict", "size": "5 keys"}
"implicit_actions": {"type": "list", "size": "11 items"}
"inferred_findings": {"type": "list", "size": "0 items"}
"integrations": {"type": "dict", "size": "3 keys"}
"interleaved_action_plan": {"type": "list", "size": "15 items"}
"intune_app_protection": {"type": "dict", "size": "3 keys"}
"legacy_auth_summary": {"type": "dict", "size": "5 keys"}
"legacy_auth_users": {"type": "dict", "size": "6 keys"}
"license_overview": {"type": "dict", "size": "10 keys"}
"license_summary": {"type": "dict", "size": "6 keys"}
"license_utilization": {"type": "dict", "size": "4 keys"}
"lifecycle_summary": {"type": "dict", "size": "6 keys"}
"lifecycle_summary_deep": {"type": "dict", "size": "0 keys"}
"log_analytics_summary": {"type": "dict", "size": "13 keys"}
"managed_app_policies": {"type": "dict", "size": "3 keys"}
"managed_devices_summary": {"type": "dict", "size": "3 keys"}
"mde_summary": {"type": "dict", "size": "18 keys"}
"measurement_map": {"type": "list", "size": "7 items"}
"mfa_coverage": {"type": "dict", "size": "12 keys"}
"named_locations_summary": {"type": "dict", "size": "4 keys"}
"next_7_days_actions": {"type": "list", "size": "10 items"}
"nist_csf_assessment": {"type": "dict", "size": "6 keys"}
"oauth_audit": {"type": "dict", "size": "1 keys"}
"oauth_grants_summary": {"type": "dict", "size": "4 keys"}
"oauth_risk": {"type": "dict", "size": "5 keys"}
"oauth_risk_rollup": {"type": "dict", "size": "7 keys"}
"observed_findings": {"type": "list", "size": "139 items"}
"onedrive_usage": {"type": "dict", "size": "0 keys"}
"onprem_ad_assessment": {"type": "dict", "size": "10 keys"}
"onprem_ad_environment": {"type": "dict", "size": "17 keys"}
"onprem_ad_technical": {"type": "dict", "size": "17 keys"}
"onprem_collector_bundles": {"type": "list", "size": "5 items"}
"onprem_compliance_fanout": {"type": "dict", "size": "3 keys"}
"onprem_infra_assessment": {"type": "dict", "size": "7 keys"}
"onprem_operations": {"type": "dict", "size": "7 keys"}
"org_slug": {"type": "SafeString", "size": "4 chars"}
"organization_info": {"type": "dict", "size": "8 keys"}
"overview_drilldowns": {"type": "dict", "size": "3 keys"}
"password_policies": {"type": "dict", "size": "3 keys"}
"permission_collection_status": {"type": "dict", "size": "15 keys"}
"permission_status": {"type": "dict", "size": "0 keys"}
"pim_role_settings": {"type": "dict", "size": "3 keys"}
"pim_summary": {"type": "dict", "size": "0 keys"}
"positive_findings": {"type": "list", "size": "6 items"}
"prior_snapshot": {"type": "str", "size": "0 chars"}
"prior_snapshots": {"type": "list", "size": "0 items"}
"privileged_access_rollup": {"type": "dict", "size": "7 keys"}
"privileged_accounts": {"type": "list", "size": "7 items"}
"purview_labels": {"type": "dict", "size": "0 keys"}
"purview_policies": {"type": "dict", "size": "0 keys"}
"purview_summary": {"type": "dict", "size": "9 keys"}
"recovery_readiness": {"type": "dict", "size": "8 keys"}
"remediation": {"type": "dict", "size": "3 keys"}
"renderable_detail_datasets": {"type": "dict", "size": "3 keys"}
"report_metadata": {"type": "dict", "size": "9 keys"}
"report_mode": {"type": "SafeString", "size": "10 chars"}
"report_schema_version": {"type": "SafeString", "size": "5 chars"}
"report_scope_audit": {"type": "list", "size": "15 items"}
"report_scope_audit_summary": {"type": "dict", "size": "6 keys"}
"reporting_contract_validation": {"type": "dict", "size": "6 keys"}
"retention_policies": {"type": "dict", "size": "3 keys"}
"risk_detection_summary": {"type": "dict", "size": "0 keys"}
"risky_sign_ins_30d": {"type": "dict", "size": "6 keys"}
"risky_signins_summary": {"type": "dict", "size": "6 keys"}
"risky_users_summary": {"type": "dict", "size": "5 keys"}
"rule_catalog": {"type": "list", "size": "135 items"}
"run_id": {"type": "SafeString", "size": "23 chars"}
"runbook": {"type": "dict", "size": "6 keys"}
"secure_score": {"type": "dict", "size": "10 keys"}
"secure_score_benchmarks": {"type": "dict", "size": "5 keys"}
"secure_score_controls": {"type": "dict", "size": "4 keys"}
"secure_score_recommendations": {"type": "dict", "size": "3 keys"}
"security_alerts_summary": {"type": "dict", "size": "9 keys"}
"security_feature_scorecard": {"type": "dict", "size": "5 keys"}
"sensitivity_labels_summary": {"type": "dict", "size": "3 keys"}
"service_principal_summary": {"type": "dict", "size": "5 keys"}
"sharepoint_sharing_settings": {"type": "dict", "size": "2 keys"}
"sharepoint_sites": {"type": "dict", "size": "5 keys"}
"sharepoint_summary": {"type": "dict", "size": "4 keys"}
"sign_in_summary": {"type": "dict", "size": "7 keys"}
"snapshot_metrics": {"type": "dict", "size": "4 keys"}
"soc2_assessment": {"type": "dict", "size": "5 keys"}
"software_inventory_summary": {"type": "dict", "size": "6 keys"}
"source_coverage": {"type": "dict", "size": "10 keys"}
"source_data": {"type": "dict", "size": "16 keys"}
"source_provenance": {"type": "dict", "size": "12 keys"}
"sp_audit": {"type": "dict", "size": "9 keys"}
"sprs_score": {"type": "int", "size": "int"}
"subscribed_skus": {"type": "dict", "size": "3 keys"}
"tactical_lists": {"type": "dict", "size": "5 keys"}
"teams_inventory_summary": {"type": "dict", "size": "5 keys"}
"teams_policies": {"type": "dict", "size": "3 keys"}
"teams_summary": {"type": "dict", "size": "3 keys"}
"tenant_display_name": {"type": "SafeString", "size": "23 chars"}
"tenant_identity_issues": {"type": "list", "size": "0 items"}
"tenant_overview": {"type": "dict", "size": "16 keys"}
"tenant_overview_checklist": {"type": "list", "size": "7 items"}
"terms_of_use_summary": {"type": "dict", "size": "4 keys"}
"third_party_summary": {"type": "dict", "size": "4 keys"}
"threat_hunting": {"type": "dict", "size": "3 keys"}
"threat_pulse_summary": {"type": "dict", "size": "7 keys"}
"topology_collection_status": {"type": "dict", "size": "10 keys"}
"trend_summary": {"type": "dict", "size": "3 keys"}
"trust_layer": {"type": "dict", "size": "3 keys"}
"unknowns_register": {"type": "list", "size": "1 items"}
"value_model": {"type": "dict", "size": "5 keys"}
"vulnerability_data": {"type": "dict", "size": "11 keys"}
"vulnerability_rollup": {"type": "dict", "size": "8 keys"}
"vulnerability_summary": {"type": "dict", "size": "16 keys"}
}9 DCs across 4 sites · 1 trust bypass SID filtering.
? for shortcuts| ID | Sev | Title | Node | Domain | Control |
|---|---|---|---|---|---|
| PHASE5-AD04-FSMO-dal-dc01.corp.contoso.local | P1 | FSMO concentration: dal-dc01.corp.contoso.local holds 3/5 roles — single point of failure | dal-dc01.corp.contoso.local | corp.contoso.local | AD-04 |
| PHASE5-AD04-FSMO-res-dc01.research.contoso.local | P1 | FSMO concentration: res-dc01.research.contoso.local holds 5/5 roles — single point of failure | res-dc01.research.contoso.local | research.contoso.local | AD-04 |
| OnPrem-NET-SIDFILTER-LEGACY | P0 | External trust to legacy-supplier.example has SID filtering disabled | dal-dc01.corp.contoso.local | — | — |
| OnPrem-NET-EDI-REPL-LAG | P1 | Edinburgh DC replication lag exceeds 4h threshold | dal-dc01.corp.contoso.local | — | — |
| OnPrem-AD-T0-DA-MFA | P0 | 2 Domain Admins without MFA | dal-dc01.corp.contoso.local | — | — |
| OnPrem-AD-T0-KRBTGT-247 | P0 | krbtgt password age 247 days exceeds 180-day threshold | dal-dc01.corp.contoso.local | — | — |
| OnPrem-AD-T0-ADMINSDHOLDER-PKI | P0 | AdminSDHolder ACL contains unexpected GenericWrite ACE for PKI vendor | dal-dc01.corp.contoso.local | — | — |
| OnPrem-AD-T0-ADMINSDHOLDER-BACKUP | P1 | AdminSDHolder ACL contains unexpected WriteDACL ACE for backup vendor | dal-dc01.corp.contoso.local | — | — |
| OnPrem-AD-T0-PROTECTED-USERS-EMPTY | P1 | Protected Users group has zero members | dal-dc01.corp.contoso.local | — | — |
| OnPrem-AD-T0-PASSWORD-POLICY | P1 | Default Domain Password Policy minimum length is 12 (CMMC L2 gap) | dal-dc01.corp.contoso.local | — | — |
| OnPrem-AP-UNCONSTRAINED-PRINT | P0 | DAL-PRINT01 has unconstrained Kerberos delegation | dal-dc01.corp.contoso.local | — | — |
| OnPrem-AP-UNCONSTRAINED-FILE | P0 | HSV-FILE02 has unconstrained Kerberos delegation | dal-dc01.corp.contoso.local | — | — |
| OnPrem-AP-KERBEROASTABLE-14 | P1 | 14 Kerberoastable service accounts | dal-dc01.corp.contoso.local | — | — |
| OnPrem-AP-ASREP-LEGACY | P1 | Service account svc_legacy_ctip_connector is AS-REP roastable | dal-dc01.corp.contoso.local | — | — |
| OnPrem-AP-ASREP-MES | P1 | Service account svc_mes_ctl is AS-REP roastable | dal-dc01.corp.contoso.local | — | — |
| OnPrem-AP-RC4-PERMITTED | P2 | 34 accounts still accept RC4 Kerberos encryption | dal-dc01.corp.contoso.local | — | — |
| OnPrem-ADCS-ESC1-DC | P0 | ADCS template certifies domain controllers without signature (ESC1) | dal-ca01.corp.contoso.local | — | — |
| OnPrem-ADCS-ESC1-SMARTCARD | P0 | ADCS template CorpUserSmartcard is ESC1 vulnerable | dal-ca01.corp.contoso.local | — | — |
| OnPrem-ADCS-ESC4-WORKSTATION | P1 | ADCS template ContoWorkstationAuth is ESC4 (weak ACL) vulnerable | dal-ca01.corp.contoso.local | — | — |
| OnPrem-ADCS-CA-EXPIRY-57D | P1 | Enterprise Issuing CA certificate expires in 57 days | dal-ca01.corp.contoso.local | — | — |
| OnPrem-GPO-SMB-SIGN | P0 | SMB server signing is not required domain-wide | dal-dc01.corp.contoso.local | — | — |
| OnPrem-GPO-SMB1-47 | P1 | Legacy SMBv1 enabled on 47 endpoints | dal-dc01.corp.contoso.local | — | — |
| OnPrem-GPO-LDAP-SIGN | P1 | LDAP signing is optional (LDAPServerIntegrity=1) | dal-dc01.corp.contoso.local | — | — |
| OnPrem-GPO-PS-LOGGING-203 | P2 | PowerShell script-block logging disabled across 203 hosts | dal-dc01.corp.contoso.local | — | — |
| OnPrem-GPO-LSA-PROTECT | P2 | LSA Protection (RunAsPPL) is not enabled | dal-dc01.corp.contoso.local | — | — |
| OnPrem-GPO-NTLMV1 | P2 | Legacy NTLMv1 authentication is still allowed | dal-dc01.corp.contoso.local | — | — |
| OnPrem-GPO-SYSVOL-ACL | P3 | SYSVOL permissions hardened (no action required) | dal-dc01.corp.contoso.local | — | — |
| Findings not yet placed on topology · 25 unknown-kind or unresolved asset | |||||
| OnPrem-a838cee6bbdebeade5b6f87e45bd47bf | P0 | External trust to legacy-supplier.example has SID filtering disabled | Unplaced | infrastructure | — |
| OnPrem-bb5a9d6f577335e859fca4309670b184 | P1 | Edinburgh DC replication lag exceeds 4h threshold | Unplaced | infrastructure | — |
| OnPrem-b2f1b05d8a827a2e5c84fa24de42f482 | P0 | 2 Domain Admins without MFA | Unplaced | identity | — |
| OnPrem-bed89eaf2193e46f4ff4e32592dae478 | P0 | krbtgt password age 247 days exceeds 180-day threshold | Unplaced | identity | — |
| OnPrem-16f7917e737ec4706ddf063523c83342 | P0 | AdminSDHolder ACL contains unexpected GenericWrite ACE for PKI vendor | Unplaced | identity | — |
| OnPrem-a44af409d7d11e59c1493a0dbe64697b | P1 | AdminSDHolder ACL contains unexpected WriteDACL ACE for backup vendor | Unplaced | identity | — |
| OnPrem-f0f7d0c50d45e6b1a1ec9b4d31aa74e3 | P1 | Protected Users group has zero members | Unplaced | identity | — |
| OnPrem-196a963ef20ace8c875acdb6bd3cd146 | P1 | Default Domain Password Policy minimum length is 12 (CMMC L2 gap) | Unplaced | identity | — |
| OnPrem-8ca006d6163ddcbbaba1e7966c2eadbf | P0 | DAL-PRINT01 has unconstrained Kerberos delegation | Unplaced | identity | — |
| OnPrem-fa9a1cc45e2cca28fe8473c0489bcad6 | P0 | HSV-FILE02 has unconstrained Kerberos delegation | Unplaced | identity | — |
| OnPrem-973c8114634333ec705572385c76c6a8 | P1 | 14 Kerberoastable service accounts | Unplaced | identity | — |
| OnPrem-115a403197926fcf3729afc5e5c88fd4 | P1 | Service account svc_legacy_ctip_connector is AS-REP roastable | Unplaced | identity | — |
| OnPrem-2e376a0ca89c5193bc5bbd75360d2e4d | P1 | Service account svc_mes_ctl is AS-REP roastable | Unplaced | identity | — |
| OnPrem-97a5bcd3de1156ed22b2c2c6bf46b7c4 | P2 | 34 accounts still accept RC4 Kerberos encryption | Unplaced | identity | — |
| OnPrem-4aa38d65ce3032519d1f521931c464da | P0 | ADCS template certifies domain controllers without signature (ESC1) | Unplaced | identity | — |
| OnPrem-76680815350c3b60af20b49eed10bff4 | P0 | ADCS template CorpUserSmartcard is ESC1 vulnerable | Unplaced | identity | — |
| OnPrem-0f0e6181ecd6d31732ee82cce27690dd | P1 | ADCS template ContoWorkstationAuth is ESC4 (weak ACL) vulnerable | Unplaced | identity | — |
| OnPrem-ec4b457d71895584370f8701340b7c3a | P1 | Enterprise Issuing CA certificate expires in 57 days | Unplaced | identity | — |
| OnPrem-2481dae51698953372cf8077e7873270 | P0 | SMB server signing is not required domain-wide | Unplaced | identity | — |
| OnPrem-ad9235417f447a7ed15961e756550e6e | P1 | Legacy SMBv1 enabled on 47 endpoints | Unplaced | identity | — |
| OnPrem-a249894fcd65540f5d07fd99f55e1c4b | P1 | LDAP signing is optional (LDAPServerIntegrity=1) | Unplaced | identity | — |
| OnPrem-d9410d7869f255a0fec2355e9aefcf99 | P2 | PowerShell script-block logging disabled across 203 hosts | Unplaced | identity | — |
| OnPrem-0f77e63ab314918dcaf223a564609ca8 | P2 | LSA Protection (RunAsPPL) is not enabled | Unplaced | identity | — |
| OnPrem-42f2c00314d0c3e902ae242f5915f138 | P2 | Legacy NTLMv1 authentication is still allowed | Unplaced | identity | — |
| OnPrem-2033c52168ea3ca38362f4cc45adf8dd | P3 | SYSVOL permissions hardened (no action required) | Unplaced | identity | — |