Filter: Severity:
MITRE ATT&CK Compliance
68%
6 tactics below 70%
Critical Vulns
23
▲ 5 new this week
Device Compliance
87%
▼ 2% improvement
CA Policies Active
18
3 in report-only
Vulnerable Software Inventory
Risk Matrix
Exposure Trend (90 Days)
Risk exposure trend based on vulnerability pressure, exploit activity, and endpoint risk telemetry.
Current Exposure
0.0
Trend vs prior period
0.0
Standards Readiness Snapshot
Cross-framework compliance highlights with focus areas needing additional hardening.
Device Distribution
Total Devices
0
Across all device types
Vulnerability Risk Overview
At-a-glance risk posture for immediate situational awareness. Use the explorer below to drill down.
Urgent Signals
Highest urgency findings and software clusters driving current risk.
Severity Distribution
Top Risk Software
Vulnerability Explorer
MITRE ATT&CK Coverage + Heatmap
Tactic Coverage
Coverage bars by ATT&CK tactic with mapped gap counts.
Heatmap
Hotspot matrix for rapid detection of lower-coverage tactics.
Cyber Essentials Compliance
Overall compliance
0%
Cyber Essentials and Cyber Essentials Plus coverage.
Framework reference: Cyber Essentials Requirements for IT Infrastructure v3.3 (from 27 April 2026) · Last checked: 29 Apr 2026
Scoring basis: Estimated from managed endpoint telemetry.
CIS Controls (v8) Coverage
Estimated coverage
0%
Based on control telemetry and policy posture.
Framework reference: CIS Controls v8.1 · Last checked: 29 Apr 2026
Scoring basis: Estimated from managed inventory + posture telemetry.
NIST CSF 2.0 Snapshot
Estimated function coverage
0%
Based on function telemetry and control posture.
Framework reference: NIST CSF 2.0 · Last checked: 29 Apr 2026
Scoring basis: Estimated from control and exposure telemetry.
Identity Security Baseline
NIS2.0 Essential Measures
Estimated NIS2 alignment
0%
Framework reference: NIS2 Directive (EU) 2022/2555 · Last checked: 29 Apr 2026
Scoring basis: Estimated alignment from mapped operational controls.
Device Inventory MOCK
Device Name Type OS Health Platform Ver. Engine Ver. Security Intel Ver. Missing OS Patches Vulns CA Policies
Conditional Access Policies
Compliance scale: 0% Low (Red) -> 100% High (Green)
Policy Gap Intelligence
Compensation
Priority policy gaps based on state, coverage, and missing controls that increase attack-path exposure.
Detects exact duplicates, high overlap, and conflicting controls to reduce policy sprawl and simplify CA design.
Conditional Access Journey Map
End-to-end policy journey from identity to enforcement, with misconfiguration hotspots, best-practice validation, and ATT&CK mapping.
Policy Remediation Design Path
Clear phased remediation path to remove critical gaps, reduce duplication, and harden policy enforcement.
Defender for Endpoint Policy Posture
Policy-level visibility across assignment coverage, configuration compliance, detection outcomes, communication freshness, and control gaps.
Endpoint Compliance & Communication
OS cohort posture based on policy compliance reporting, last communication, and unresolved policy gaps.
MDE Policy Inventory Explorer
Showing 0 policies
Microsoft Secure Score Recommendation Gaps
Control-level recommendations pulled from Microsoft Graph Security secureScores and secureScoreControlProfiles, grouped by workload to show where secure-score gaps remain.
Defender Stack Compliance
Defender Health
Latest Platform Version
n/a
Coverage
0.0%
Compliance & Gap Reports
Generate criteria-based compliance and gap reports across Cyber Essentials, CIS, NIST, NIS2, Secure Score, MDE posture, Conditional Access, endpoints, and vulnerabilities.