Demo Mode

Every screen, flow, export, and remediation path is the real Veri-Guard product. The specific findings, scores, and runbooks shown are curated to illustrate a typical before/after story. Your tenant scan produces your own numbers.

Get started
V

Veri-Docs Dev Lab

Security Compliance Report

April 22, 2026

Confidential

67out of 100
353
Controls Passing
174
Controls Failing
548
Total Assessed
Moderate
Risk Level
15 breaches
15 documented security incidents with over $6.6B in combined costs were caused by the same misconfigurations currently present in this tenant.

Framework Compliance

FrameworkScorePassingFailingChecked
EIDSCA62%6440104
CISA Secure Baseline64%6839107
CIS Microsoft 36567%250123373
NIST 800-53 r568%17985264
ISO 27001:202269%7433107
HHS 405(d) HICP69%14263205
NIST CSF 2.070%351550
SOC 2 Type II73%381452
HIPAA Security Rule73%371451

Domain Scores

exchange
53%
identity
54%
teams
67%
defender
70%
intune
82%
sharepoint
94%
V

Veri-Docs Dev Lab

Top Risks & Recommendations

April 22, 2026

Confidential

Top 10 Highest Severity Failing Controls

#ControlSeverityPrecedent
1
Block legacy authentication protocols
CIS-1.1.2
critical2 incidents
2
Configure sign-in risk Conditional Access policy
CIS-1.2.1
critical
3
Block legacy auth endpoints at the authentication methods policy
EIDSCA-AP03
critical
4
Require MFA for Global Administrator sign-ins
CIS-1.1.10
critical
5
Enforce Conditional Access for unmanaged devices
CIS-1.1.16
critical
6
Enforce guest user access review cadence
CIS-1.3.1
critical2 incidents
7
Block legacy POP3 authentication to mailboxes
CIS-1.3.7
critical
8
Disable voice call as a primary authentication method
CIS-1.3.13
critical
9
Enforce authenticator app lockout policy
CIS-1.4.5
critical
10
Enforce persistent browser sessions off for unmanaged devices
CIS-1.4.11
critical

Linked Breach Precedents

The following documented security incidents were caused by the same misconfigurations currently present in this tenant. These precedents illustrate the real-world consequences of leaving these controls unaddressed.

Change Healthcare Ransomware
Feb 2024Healthcare
$1.6B+
Healthcare M365 Email Breaches (180 orgs)
2024Healthcare
$1.7B/yr
SolarWinds Supply Chain Attack
Dec 2020Government/Technology
$100M+
Montefiore Medical Center (HIPAA)
Feb 2024Healthcare
$4.75M
Microsoft Midnight Blizzard
Jan 2024Technology
$1B+ (SFI)
Colonial Pipeline Ransomware
May 2021Critical Infrastructure
$4.4M ransom + $1B+ impact

Recommended Next Steps

1
Remediate Critical & High Severity Controls
100 controls at Critical or High severity should be prioritized for immediate remediation. 174 of these support automated remediation.
2
Enable Continuous Monitoring
Schedule weekly scans to detect compliance regressions as configurations change. Track score trends over time to demonstrate continuous improvement.
3
Address License Gaps
All required licenses are present. No gaps to address.