AD0.7 Secure Score: What It Means and What It Doesn't
Figure AD0.7 — Secure Score is a configuration checklist, not a security rating. Use it to identify which controls to configure next, not as an absolute measure of your security posture. A tenant with a 55% score and properly configured conditional access is more secure than a tenant with a 75% score and no MFA enforcement.
What the number actually measures
Secure Score calculates a percentage based on how many of Microsoft’s recommended configurations you’ve implemented. Each recommendation is worth a certain number of points. The total possible points represent 100%. Your current score is the percentage of those points you’ve earned by implementing the recommended configurations.
The recommendations span the entire M365 security stack: identity (MFA, conditional access, admin role configuration), email (anti-phishing, Safe Links, anti-malware), endpoint (Defender for Endpoint configuration, ASR rules), data (DLP, sensitivity labels, retention), and infrastructure (Azure AD settings, SharePoint sharing, Teams guest access). A score of 43% means you’ve implemented 43% of the configurations Microsoft recommends, not that your environment is 43% secure.
The distinction matters because Secure Score weights all recommendations equally within their categories, but the real-world security impact of each recommendation varies enormously. Enabling MFA for all users is worth a certain number of points. Configuring a SharePoint sharing expiration policy is worth a different number of points. From Secure Score’s perspective, these are comparable actions. From a security perspective, MFA prevents account takeover and sharing expiration prevents stale external access — vastly different impact levels.
Which recommendations matter most
Sort the improvement actions by “Score impact” (points you’d gain) and scan the top 20. In most tenants, the highest-impact recommendations cluster around four areas: MFA and conditional access (if not fully enforced), legacy authentication blocking, email protection policies (Safe Links, Safe Attachments), and admin role management (reducing the number of Global Administrators).
These four areas typically represent 30-40% of your total achievable score improvement. More importantly, they represent 80% of the security improvement that matters against real attacks. The remaining 60-70% of Secure Score improvements address real but lower-priority configurations — SharePoint sharing restrictions, Teams meeting policies, app consent settings, and sensitivity label deployment.
The practical approach: implement the top 5-10 recommendations sorted by score impact this month. Then review the next 10 next month. Don’t try to address all 200+ recommendations at once — you’ll burn out and lose focus on the controls that matter most.
Walking through a Secure Score recommendation
Here’s what a practical Secure Score workflow looks like. You navigate to security.microsoft.com → Secure Score → Improvement actions and sort by “Score impact.” The top recommendation says “Ensure multifactor authentication is enabled for all users in all roles” with a score impact of 9 points.
Click on the recommendation. The detail page shows you three things: the current status (how many users are covered), the implementation steps (what to configure), and the expected impact (how many points you’ll gain). Microsoft also shows you the “Impacted users” tab — the specific users who would be affected if you implemented this change.
This is where Secure Score becomes practical rather than abstract. Instead of staring at a list of 200 recommendations, you’re looking at one specific change, the users it affects, and the steps to implement it. You can check whether those users have registered for MFA (Entra admin center → Users → Per-user MFA or the Authentication methods registration report), identify any who haven’t, and plan the communication before you enforce the policy.
Some recommendations show a “Resolve through third party” or “Resolve through alternate mitigation” option. This is for situations where you’ve addressed the risk through a different control than the one Microsoft recommends. For example, if you block legacy authentication through a firewall rule instead of a conditional access policy, you can mark the recommendation as “Resolved through alternate mitigation” to get the score credit. Use this honestly — marking recommendations as resolved when they’re not defeats the purpose of the tool.
The most useful part of Secure Score that most administrators miss is the “History” tab. This shows your score over time as a graph. A declining score means your security configuration is drifting — either you disabled something, or Microsoft added new recommendations you haven’t addressed. A rising score means your improvement work is having measurable impact. Screenshot this graph quarterly for management reporting.
Using Secure Score for management reporting
Secure Score’s best use case for an IT administrator is management reporting. Executives and board members understand numbers and trends. Showing a slide that says “our Secure Score improved from 38% to 52% this quarter, driven by MFA enforcement and email protection deployment” communicates progress in terms anyone can understand.
The trend matters more than the absolute number. A score that improves month over month demonstrates that security work is being done. A score that drops indicates configuration drift — something was disabled, a new feature was introduced without security configuration, or new recommendations were added that you haven’t addressed yet.
For quarterly reporting to management, track three things: current Secure Score percentage, the change from the previous quarter, and the top three actions completed with their business impact. Avoid presenting the full list of 200+ recommendations — it overwhelms the audience and invites questions about items that don’t matter. Focus on what you did, why it mattered, and what you’ll do next.
Recommendations worth acting on versus recommendations to defer
Not all Secure Score recommendations are equal, and the point values don’t always reflect real-world impact. Here’s a practical classification based on what actually reduces risk in a typical M365 E3 environment.
Act immediately (this week): MFA for all users, block legacy authentication, reduce Global Administrator count to 2-4, enable self-service password reset, configure Safe Links and Safe Attachments. These are the identity and email controls that prevent the most common attacks. They’re all free (included in E3), require minimal testing, and have well-understood blast radii.
Act soon (this month): Enable audit logging for mailbox actions, configure anti-phishing impersonation protection, set up device compliance policies, configure email authentication (SPF/DKIM/DMARC), enable the unified audit log search. These require more planning and testing but deliver real protection.
Defer consciously (next quarter): Sensitivity labels across all documents, DLP policies, application consent workflow, SharePoint external sharing restrictions, Teams guest access policies. These are valuable but lower priority — they protect data rather than preventing the initial compromise. They also require significant user communication and change management.
Defer or ignore (low ROI): Recommendations that require E5 features you don’t have, recommendations for platforms you don’t use (if you don’t use Power Platform, don’t worry about Power Platform security recommendations), and recommendations that would cause unacceptable user friction for marginal security benefit. Mark these as “Risk accepted” with a note explaining why, so your decision is documented and reviewable.
The discipline is in the conscious deferral. Every recommendation you choose not to implement right now should be a deliberate decision with a documented rationale — not an oversight. This is the difference between “we haven’t done it yet” (passive risk) and “we’ve assessed it and deprioritised it because the identity and email controls are higher impact” (active risk management).
In the Secure Score portal, the “Comparison” tab lets you compare your score against similar-sized organisations in your industry. This is useful context for management reporting — “we are above the median for companies our size” is more meaningful than a raw percentage. However, don’t use the comparison as a reason to stop improving. Being better than average in a population where average gets breached is not a defensible position.
Your Secure Score is 41%. The highest-impact improvement action is “Ensure multifactor authentication is enabled for all users” (worth 9 points). The second-highest is “Turn on Microsoft Defender for Office 365 Safe Attachments” (worth 7 points). The third-highest is “Configure Exchange Online SPF records” (worth 5 points). You have time to implement one this week. Which one do you choose?
Option A: SPF records — it’s the quickest to implement (one DNS record change).
Option B: MFA for all users — it’s the highest-impact recommendation.
Option C: Safe Attachments — it protects against the malware your users keep downloading.
Choose Option B. MFA enforcement is the single highest-impact security control in any M365 environment. It’s worth more points and it addresses the attack vector that causes the most damage. SPF is important for email authentication but it prevents email spoofing of your domain — it doesn’t protect your users from being phished. Safe Attachments is valuable but secondary to MFA — if an attacker can’t authenticate with stolen credentials, the malware attachment they send is less impactful. Always implement identity controls before email controls.
Try it: Build your improvement action list
Navigate to security.microsoft.com → Secure Score → Improvement actions. Sort by “Score impact” descending. Write down the top 10 improvement actions with their point values.
For each action, note three things: the score impact, the estimated implementation difficulty (can you do this today, this week, or does it need planning?), and whether the action requires a license upgrade. Actions that require E5 or add-on licenses are still valuable to track — they build the case for a license upgrade when budget discussions happen.
Circle the top 3 actions you can implement this week. These are your immediate priorities. The rest go on a monthly review list.
You're reading the free modules of M365 Security: From Admin to Defender
The full course continues with advanced topics, production detection rules, worked investigation scenarios, and deployable artifacts. Premium subscribers get access to all courses.