In this module

AD3.10 Reporting Device Security to Management

5-6 hours · Module 3 · Free
Operational Objective
You've deployed compliance policies across all platforms, enforced conditional access, built the exception workflow, and established monitoring. The device layer is operational. Now you need to communicate this to management — not as a list of Intune policies, but as a measurable improvement in your organization's security posture. This subsection adds device security metrics to the quarterly report you started building in Module AD1, connecting the three layers (identity, email, device) into a cohesive story of progressive security improvement.
Deliverable: The device security section of your quarterly management report, with metrics that demonstrate compliance coverage, encryption protection, and the AiTM defense that device compliance provides.
Estimated completion: 20 minutes
QUARTERLY REPORT — THE COMPLETE THREE-LAYER PICTURE IDENTITY (AD1) MFA coverage: 100% Legacy auth: 0 sign-ins Credential attacks blocked: 89 Incidents: 1 (contained 12 min) Layer 1 ✓ EMAIL (AD2) Phishing blocked: 47 emails Safe Links clicks blocked: 12 Attachments detonated: 8 DMARC: p=quarantine (progressing) Layer 2 ✓ DEVICES (AD3) Compliance rate: 97% Encryption coverage: 100% Unmanaged access blocked: 15 Exceptions: 3 (reviewed quarterly) Layer 3 ✓ — THIS MODULE

Figure AD3.10 — The quarterly management report now covers all three security layers. Identity metrics from Module AD1, email metrics from Module AD2, and device metrics from this module. Together, they demonstrate comprehensive protection against credential attacks (identity), phishing delivery (email), and unmanaged device access (devices).

The device metrics that matter for management

Add these four metrics to your quarterly report under a "Device Security" section:

1. Compliance rate (target: 95%+). "97% of all managed devices meet our security compliance requirements — encryption enabled, OS current, antivirus active, firewall on." This single number communicates that nearly every device in the organization meets a verified security standard. The trend over quarters shows maintenance: "compliance has held at 96-98% for three consecutive quarters."

2. Encryption coverage (target: 100% Windows, 100% macOS). "Every Windows laptop and macOS device accessing corporate data has full disk encryption enabled." This is the metric that matters most for data breach risk: a lost or stolen encrypted laptop is a hardware loss, not a data breach. An unencrypted laptop is a potential notification event.

3. Unmanaged device blocks. "Conditional access blocked 15 sign-in attempts from unmanaged devices this quarter." This demonstrates that the control is working — attempts to access corporate data from devices that don't meet your security standards are being caught. For management context: "Each of these blocks could have been an attacker replaying stolen credentials from their own device. The compliance requirement stopped them."

4. Exception count and status. "3 active device compliance exceptions, each with documented alternative controls and quarterly review dates." This shows that gaps are managed, not ignored. Transparency about exceptions builds credibility — it demonstrates mature risk management rather than a false claim of zero gaps.

Connecting device compliance to the AiTM narrative

The most powerful way to explain device compliance to management is through the AiTM attack narrative. In Module AD1, you explained AiTM: the attacker captures session tokens that bypass MFA. In Module AD2, you showed that Safe Links catches the phishing page. Device compliance is the third defense:

"Even if an attacker captures a fully authenticated session token through a sophisticated phishing proxy — bypassing MFA — they cannot use that token because our conditional access policy requires a managed device. The attacker's laptop isn't enrolled in our device management system. The stolen token is useless without a compliant device. This quarter, conditional access blocked 15 sign-in attempts from unmanaged devices — any of these could have been an attacker."

This narrative connects technical controls to business risk in a way that non-technical stakeholders understand: we have three layers of protection, each catching what the previous one misses, and all three are operational and measured.

Extracting device metrics for the report

Use these specific queries and portal locations to pull the four metrics for your quarterly report:

Metric 1 — Compliance rate. Run Get-ComplianceReport.ps1 from AD3.9. Record the overall percentage. Also record the per-platform breakdown — this answers the follow-up question "what about the Macs and phones?"

Metric 2 — Encryption coverage. From the same script, record the Windows encryption percentage. For macOS, check intune.microsoft.com → Devices → macOS → filter by compliance → check FileVault status. Report as: "100% of Windows devices and 100% of macOS devices have full disk encryption verified and active."

Metric 3 — Unmanaged device blocks. Query the sign-in log for CA003 failures:

Connect-MgGraph -Scopes "AuditLog.Read.All"
$quarterStart = (Get-Date).AddDays(-90).ToString("yyyy-MM-ddTHH:mm:ssZ")
$signIns = Get-MgAuditLogSignIn -Filter "createdDateTime ge $quarterStart" -All

$caBlocks = $signIns | Where-Object {
    $_.ConditionalAccessPolicies | Where-Object {
        $_.DisplayName -like "*CA003*" -and $_.Result -eq "failure"
    }
}

Write-Host "CA003 blocks this quarter: $($caBlocks.Count)"
$caBlocks | Group-Object UserPrincipalName |
    Select-Object Name, Count |
    Sort-Object Count -Descending | Format-Table

Report as: "Conditional access blocked [X] sign-in attempts from non-compliant or unmanaged devices this quarter." If any of these correspond to unusual IPs or users who shouldn't be accessing M365 from personal devices, note them as potential security events caught by the device compliance layer.

Metric 4 — Exception count. Count the active exceptions in your register from AD3.8. Report as: "[X] devices have documented compliance exceptions with alternative controls. All exceptions reviewed quarterly. [Y] expired exceptions were remediated this quarter."

Writing the executive summary paragraph

Combine all three layers into a single executive summary paragraph for the top of your report. Here's the template adapted for NE:

"This quarter, our security program protected Northgate Engineering against credential attacks (89 blocked by MFA, zero successful compromises), phishing delivery (47 emails blocked by Safe Links and Safe Attachments, 12 malicious clicks caught by URL protection), and unmanaged device access (15 sign-in attempts blocked by device compliance — each potentially an attacker attempting to use stolen credentials from their own device). All 180 devices are encrypted and verified compliant. Three devices have documented exceptions with compensating controls. DMARC is progressing from monitoring to enforcement — domain spoofing protection will be complete by end of next quarter. Zero security incidents from protected attack vectors this quarter."

That's the entire quarterly report executive summary. One paragraph. Every number is real, pulled from the tools you configured in Modules AD1-AD3. No jargon. No hedging. Specific, measurable, and directly connected to business risk. Print this paragraph, hand it to any executive, and they understand exactly what you've done and why it matters.

Structuring the full quarterly report

The executive summary paragraph goes on page 1. Below it, structure the full report as three sections with specific numbers and one-sentence explanations:

Section 1 — Identity Protection (Module AD1)

  • MFA coverage: 100% (210/210 users)
  • Legacy authentication: blocked (0 sign-ins using legacy protocols)
  • Credential attacks blocked: 89 (password spray, brute force, credential stuffing)
  • Compromised accounts: 0 this quarter
  • Conditional access policies: 3 active (CA001 MFA, CA002 Block Legacy, CA003 Compliant Device)
  • MFA exceptions: 1 (conference room account, reviewed quarterly)

Section 2 — Email Protection (Module AD2)

  • Phishing emails blocked: 47 (Safe Links: 23, Safe Attachments: 8, Anti-phishing: 16)
  • User phishing clicks blocked by Safe Links: 12
  • User-reported phishing: 15 reports, 4 confirmed threats, 11 false positives
  • DMARC status: p=quarantine (progressing to p=reject next quarter)
  • Email authentication: SPF ✓, DKIM ✓, DMARC monitoring active

Section 3 — Device Protection (Module AD3)

  • Device compliance rate: 97% (174/180 devices compliant)
  • Encryption coverage: 100% Windows, 100% macOS
  • Unmanaged device access blocked: 15 sign-in attempts
  • Compliance exceptions: 3 (all with documented alternative controls, next review: Q3)
  • Platforms covered: Windows (145), macOS (10), iOS (25), Android (0 — no corporate Android)

Each section takes 5 minutes to compile using the PowerShell scripts and portal dashboards you've built. The entire report takes 20 minutes to produce quarterly — because the data collection is automated and the structure is templated.

After your second quarterly report, you can show trends — and trends are more powerful than snapshots. Create a simple tracking spreadsheet with one row per quarter:

QuarterMFA CoverageAttacks BlockedPhishing BlockedCompliance RateEncryptionExceptions
Q1 2026100%894797%100%3
Q2 2026100%

After three quarters, the trend line tells a story: "Security controls have maintained 97%+ compliance for three consecutive quarters with zero security incidents from covered attack vectors." A sustained trend is stronger evidence than any single quarter's numbers — it demonstrates that the security program is operational, not just a one-time project.

If a metric declines (compliance drops from 97% to 92%), the trend catches it immediately and the quarterly report explains why and what remediation is underway. This transparency builds credibility: you're not hiding problems, you're managing them visibly.

Presenting to different audiences

The same data supports different conversations:

For your direct manager: Focus on the numbers and the time investment. "These results took 30 minutes per week to maintain after the initial 6-week deployment. The controls are automated — I'm monitoring, not manually operating."

For the IT director or CTO: Focus on risk reduction and cost. "We eliminated the three most common M365 attack vectors (credential theft, phishing delivery, unmanaged device access) using controls already included in our E3 license — zero additional cost. The remaining risk areas are data protection and security monitoring, which are the next two phases."

For the board or CEO (if asked): Focus on business impact. "No security incidents from email or credential attacks this quarter. Every company laptop is encrypted — a lost device is a hardware loss, not a data breach. We blocked 15 attempts to access company data from unauthorized devices." Keep it to 3 sentences maximum.

Compliance Myth: "Device compliance is an IT operations issue, not a security issue"
Device compliance sits at the intersection of IT operations and security. The operations team manages devices — enrollment, updates, configurations. The security value comes from the conditional access integration: compliance isn't just about keeping devices healthy for productivity, it's about preventing unauthorized access from unhealthy or unmanaged devices. When you present device compliance to management, frame it as a security control that happens to be implemented through operations tools. The security outcome (blocking unmanaged device access) matters more to management than the implementation mechanism (Intune compliance policies).
Decision point

Your quarterly report shows that device compliance improved from 0% (no policies) to 97% over the quarter. Your manager asks: "That's great for this quarter. What happens next quarter? What else needs to be done?" How do you respond?

Option A: "Device compliance is done — we just need to maintain the 97% rate."

Option B: "Device compliance is operational. The next priorities are data protection (sensitivity labels, DLP policies) and establishing a security monitoring cadence. These are Modules AD4 and AD5 in the improvement plan. Estimated time: 4-6 hours per week for the next 4 weeks. Cost: zero — all included in E3."

The correct answer is Option B. Security is never "done" — it's operational. The device layer is deployed and maintained. The next phases (data protection, monitoring, incident response) continue the improvement sequence from Module AD0. Presenting the next steps immediately after demonstrating success capitalises on the momentum: "Here's what we achieved. Here's what comes next. Here's what it costs (zero). Here's the time I need." This is how incremental security programs get sustained funding and time allocation.

Try it: Build the device section of your quarterly report

Using the data from your monthly compliance report (AD3.9) and the metrics framework from this subsection, write the device security section of your quarterly report.

Four metrics: compliance rate (from Get-ComplianceReport.ps1), encryption coverage (from the same script), unmanaged device blocks (from the sign-in log — filter for CA003 failures), and exception count (from your exception register).

Add a one-sentence AiTM narrative: "Device compliance prevents attackers from using stolen session tokens from unmanaged devices — [X] such attempts were blocked this quarter."

Place this section after the Identity and Email sections in your quarterly report. The three sections together tell the complete security improvement story: identity deployed (weeks 1-2), email deployed (weeks 3-4), devices deployed (weeks 5-6). Total cost: zero. Total improvement: measurable across every metric.

Your manager reviews the quarterly report and asks: "We spent 6 weeks on security improvements. What's the single most important metric that shows it was worth it?" Which metric do you highlight?
Secure Score improved from 38% to 62% — Good trend metric but abstract. Secure Score doesn't directly connect to business risk. Management hears "62%" and doesn't know if that's good or bad.
100% MFA coverage — Important but it's an input metric, not an outcome metric. It tells you what you configured, not what it prevented.
142 credential attacks were blocked this quarter — each of these could have resulted in account compromise costing £125,000-£500,000 in direct losses. MFA stopped them all. Zero successful compromises from credential attacks — Correct. This connects the technical control (MFA) to the business outcome (attacks prevented) and the financial impact (potential losses avoided). It's specific, measurable, and immediately meaningful to anyone who manages budget. "We prevented 142 attacks at zero cost" is the ROI story that sustains security investment.
Device compliance rate at 97% — Important but without context. 97% doesn't mean anything to management without the narrative: "97% of devices meet our security standard, including full disk encryption — which means a lost laptop is a hardware replacement, not a data breach notification."

You're reading the free modules of M365 Security: From Admin to Defender

The full course continues with advanced topics, production detection rules, worked investigation scenarios, and deployable artifacts.

View Pricing See Full Syllabus