Skip to content

Reports & Exports#

The audit generates three professional report formats, each designed for a different audience and purpose.


Report Formats#

Technical PDF#

Audience: IT administrators, security engineers, MSP consultants

A comprehensive document covering every audit finding in detail.

Includes:

  • Executive summary with all three scores
  • Detailed findings by category with severity ratings
  • Full compliance framework assessment (all four frameworks)
  • Per-finding recommendations with technical detail
  • Prioritised action plan (quick wins and strategic items)
  • Complete data tables (users, policies, apps, mailboxes)
  • Audit metadata (date, scope, permissions used)

Typical length: 30–60 pages depending on tenant size


CXO Executive PDF#

Audience: CISOs, CTOs, board members, non-technical stakeholders

A business-focused summary that translates technical findings into risk and business impact.

Includes:

  • Three-score dashboard (Security Risk, Compliance Posture, Migration Complexity)
  • Risk overview with business-impact framing
  • Compliance framework summary (pass/partial/fail per framework)
  • Top findings by severity (critical and high only)
  • Prioritised remediation roadmap
  • Clean, visual layout designed for executive audiences

Typical length: 8–15 pages


CXO PowerPoint (PPTX)#

Audience: Board presentations, client meetings, steering committees

An editable PowerPoint deck you can customise and present directly.

Includes:

  • Title slide with tenant identity
  • Score dashboard slides
  • Risk summary and key findings
  • Compliance framework overview
  • Recommended actions (prioritised)
  • Designed for screen and projector presentation

Designed for: Direct use in board meetings and client consultations. Fully editable — add your own branding, notes, and commentary.


What's in Every Report#

Regardless of format, all reports include:

Section Content
Scores Security Risk, Compliance Posture, Migration Complexity with ratings
Findings Categorised by severity (Critical → Info) with descriptions and impact
Recommendations Specific actions for each finding
Compliance Control-by-control assessment for all four frameworks
Action Plan Prioritised list: quick wins first, then strategic items
Metadata Audit date, tenant ID, report generation timestamp

Downloading Reports#

Reports are generated on completion of the audit and available for immediate download from the results page.

  • Technical PDF — always available
  • CXO Executive PDF — always available
  • CXO PowerPoint — always available

All three reports are generated from the same audit data, so scores and findings are consistent across formats.


Report Retention#

Audit results and reports are retained for 30 days from the date of the audit run. After 30 days, results are automatically purged. Download your reports promptly or re-run the audit when needed.

Run audits regularly

Running audits monthly gives you trend data showing whether your security posture is improving. Each audit captures a snapshot that feeds into your score history.