Section
Overview
Executive security posture and operational risk overview.
MITRE ATT&CK Compliance
68%
6 tactics below 70%
Critical Vulns
23
▲ 5 new this week
Device Compliance
87%
▼ 2% improvement
CA Policies Active
18
3 in report-only
Vulnerable Software Inventory
Risk Matrix
Exposure Trend (90 Days)
Risk exposure trend based on vulnerability pressure, exploit activity, and endpoint risk telemetry.
Current Exposure
0.0
Trend vs prior period
0.0
Standards Readiness Snapshot
Cross-framework compliance highlights with focus areas needing additional hardening.
Device Distribution
Total Devices
0
Across all device types
Vulnerability Risk Overview
At-a-glance risk posture for immediate situational awareness. Use the explorer below to drill down.
Urgent Signals
Highest urgency findings and software clusters driving current risk.
Severity Distribution
Top Risk Software
Vulnerability Explorer
MITRE ATT&CK Coverage + Heatmap
Tactic Coverage
Coverage bars by ATT&CK tactic with mapped gap counts.
Heatmap
Hotspot matrix for rapid detection of lower-coverage tactics.
Cyber Essentials Compliance
Overall compliance
0%
Cyber Essentials and Cyber Essentials Plus coverage.
Framework reference: Cyber Essentials Requirements for IT Infrastructure v3.3 (from 27 April 2026) · Last checked: 29 Apr 2026
Scoring basis: Estimated from managed endpoint telemetry.
CIS Controls (v8) Coverage
Estimated coverage
0%
Based on control telemetry and policy posture.
Framework reference: CIS Controls v8.1 · Last checked: 29 Apr 2026
Scoring basis: Estimated from managed inventory + posture telemetry.
NIST CSF 2.0 Snapshot
Estimated function coverage
0%
Based on function telemetry and control posture.
Framework reference: NIST CSF 2.0 · Last checked: 29 Apr 2026
Scoring basis: Estimated from control and exposure telemetry.
Identity Security Baseline
NIS2.0 Essential Measures
Estimated NIS2 alignment
0%
Framework reference: NIS2 Directive (EU) 2022/2555 · Last checked: 29 Apr 2026
Scoring basis: Estimated alignment from mapped operational controls.
Device Inventory
MOCK
| Device Name | Type | OS | Health | Platform Ver. | Engine Ver. | Security Intel Ver. | Missing OS Patches | Vulns | CA Policies |
|---|
Conditional Access Policies
Compliance scale: 0% Low (Red) -> 100% High (Green)
Policy Gap Intelligence
Compensation
Priority policy gaps based on state, coverage, and missing controls that increase attack-path exposure.
Policy Overlap & Duplication
Detects exact duplicates, high overlap, and conflicting controls to reduce policy sprawl and simplify CA design.
Priority Gap Queue
Conditional Access Journey Map
End-to-end policy journey from identity to enforcement, with misconfiguration hotspots, best-practice validation, and ATT&CK mapping.
Policy Remediation Design Path
Clear phased remediation path to remove critical gaps, reduce duplication, and harden policy enforcement.
Defender for Endpoint Policy Posture
Policy-level visibility across assignment coverage, configuration compliance, detection outcomes, communication freshness, and control gaps.
Endpoint Compliance & Communication
OS cohort posture based on policy compliance reporting, last communication, and unresolved policy gaps.
MDE Policy Inventory Explorer
Showing 0 policies
Microsoft Secure Score Recommendation Gaps
Control-level recommendations pulled from Microsoft Graph Security secureScores and secureScoreControlProfiles, grouped by workload to show where secure-score gaps remain.
Recommendation Breakdown by Workload
Defender Stack Compliance
Defender Health
Latest Platform Version
n/a
Coverage
0.0%
Compliance & Gap Reports
Generate criteria-based compliance and gap reports across Cyber Essentials, CIS, NIST, NIS2, Secure Score, MDE posture, Conditional Access, endpoints, and vulnerabilities.
Report Preview