The Dashboard That Lies to You
Your Microsoft Secure Score says 78%. Your CEO sees it in a quarterly security review and feels reassured. "We're doing well," they think. "Almost 80%."
But here's what that number doesn't tell you:
- Someone disabled a critical Conditional Access policy two days ago
- You have 7 standing Global Admins instead of the 2 you intended
- Legacy authentication got re-enabled on three service accounts last week
- Guest access settings were loosened and nobody noticed
Your score hasn't changed. Your actual security posture has degraded significantly.
This is the fundamental problem with Secure Score: it measures potential, not reality. It tells you what you could do, not whether you're actually doing it.
What Microsoft Secure Score Actually Measures
Let's be clear about what Secure Score is. Microsoft designed it as a gamified recommendation engine. It:
- Assigns points for enabling security features
- Compares you against Microsoft's recommended configuration
- Suggests actions to improve your score
- Tracks progress over time
For organizations just starting their security journey, this is genuinely valuable. If you've never thought about MFA or legacy authentication, Secure Score points you in the right direction.
But Secure Score has fundamental limitations that make it insufficient for mature security operations.
The Five Problems With Secure Score
1. It Measures Configuration, Not Compliance
Secure Score checks if MFA is enabled. It doesn't check if everyone is actually using it.
You could enable MFA, get your points, and still have:
- Users with authentication methods that bypass MFA
- Service accounts excluded from MFA policies
- Conditional Access policies with gaps that allow MFA bypass
- Legacy authentication protocols that don't support MFA
The score says you have MFA. The reality might be very different.
2. It Ignores Your Business Context
Secure Score applies Microsoft's one-size-fits-all recommendations to every organization. But security requirements vary dramatically:
- A healthcare company needs different controls than a marketing agency
- A company with remote workers needs different policies than one with on-premises staff
- An organization handling financial data has different requirements than a consulting firm
Secure Score can't know that your "improvement action" to restrict guest access would break your entire partner collaboration model. It just sees a potential point gain.
3. It Doesn't Detect Drift
This is the critical gap. Secure Score tells you your current configuration. It doesn't tell you:
- When configurations changed
- Who changed them
- Whether the change was intentional
- If you've drifted from your baseline
You could have a perfect Secure Score on Monday, and someone disables a critical policy on Tuesday. Your score might not change for days, and when it does, there's no context about what happened.
4. It Creates False Confidence
A high Secure Score feels good. It's a number you can report to leadership. But that number can mask serious problems:
- 78% sounds secure — but the 22% gap might include your most critical controls
- Score improvements feel like progress — even when they're addressing low-priority items
- Comparison to "similar organizations" — doesn't mean those organizations are actually secure
We've seen tenants with 80%+ Secure Scores that had standing Global Admin access for departed employees, disabled risk policies, and wide-open guest access.
5. It Doesn't Align With Compliance Frameworks
Auditors don't ask "What's your Secure Score?" They ask:
- "Show me evidence of continuous access control monitoring"
- "Demonstrate that MFA is enforced for all privileged users"
- "Provide audit logs showing configuration changes are detected and reviewed"
Secure Score doesn't map cleanly to SOC 2, ISO 27001, or CIS benchmarks. It's Microsoft's framework, not an industry standard.
What Continuous Monitoring Actually Means
Continuous monitoring flips the model. Instead of asking "What's our score?", it asks "Does our actual configuration match our intended baseline?"
Here's the difference:
| Aspect | Secure Score | Continuous Monitoring |
|---|---|---|
| Question | "What could we enable?" | "Is our config correct right now?" |
| Frequency | Periodic snapshots | Continuous evaluation |
| Drift detection | No | Yes |
| Custom baselines | No | Yes |
| Audit evidence | Limited | Complete timeline |
| Auto-remediation | No | Yes (with TrueConfig) |
Define Your Baseline Once
Instead of chasing Microsoft's recommendations, you define what "secure" means for your organization:
- Maximum 3 standing Global Admins
- Legacy authentication disabled everywhere
- Guest invitations restricted to admins
- MFA required for all users, no exceptions
This baseline reflects your business requirements, your risk tolerance, and your compliance obligations.
Detect Drift Immediately
When reality deviates from your baseline, you know within hours, not weeks:
- New Global Admin added → Alert
- Legacy auth re-enabled → Alert (or auto-fix)
- Conditional Access policy disabled → Alert
- Guest settings loosened → Alert
Every deviation includes context: what changed, when, and (where available) who made the change.
Maintain Complete Audit Evidence
Continuous monitoring creates the audit trail that compliance requires:
- Timestamp of every evaluation
- Before/after state for every deviation
- Remediation actions taken
- Acknowledgment of intentional exceptions
When auditors ask for evidence, you have a complete timeline, not a screenshot from last Tuesday.
The Practical Reality
Let's walk through a real scenario that illustrates the difference.
The Scenario
It's Wednesday. Your IT admin temporarily enables legacy authentication to troubleshoot an executive's email client issue. They fix the problem but forget to disable legacy auth.
With Secure Score Only
- Day 1-3: Nothing happens. Your score might not reflect the change immediately.
- Day 4: Maybe your score drops slightly. Maybe not, depending on other changes.
- Day 7: Weekly security review. Someone notices the score dip. Investigation begins.
- Day 10: Root cause identified. Legacy auth disabled.
Total exposure window: 10 days
With Continuous Monitoring
- Hour 1: Deviation detected. Legacy auth enabled on tenant.
- Hour 1: Alert sent to security team (or auto-remediated if enabled).
- Hour 2: If manual: admin reviews, confirms it was intentional for troubleshooting.
- Hour 3: Admin marks as temporary exception or immediately disables.
Total exposure window: 1-3 hours
The difference isn't theoretical. It's the difference between an attacker having 10 days to exploit a weakness versus 3 hours.
When Secure Score Makes Sense
Secure Score isn't useless. It serves valid purposes:
- Starting point: If you're new to Microsoft 365 security, Secure Score shows you what to focus on
- Broad guidance: It surfaces features you might not know exist
- Executive reporting: Some leadership teams want a simple number (with appropriate caveats)
- Microsoft-recommended settings: If you want to follow Microsoft's playbook exactly
If you're a 20-person company with no IT staff, enabling Security Defaults and following Secure Score recommendations is a reasonable approach.
When You Need Continuous Monitoring
You've outgrown Secure Score when:
- You have compliance requirements: SOC 2, ISO 27001, HIPAA, or similar frameworks require continuous monitoring, not periodic scores
- You manage multiple tenants: MSPs need consistent baselines across clients, not individual score chasing
- You've been burned by drift: If you've ever discovered a critical misconfiguration weeks after it occurred, you need detection
- You need audit evidence: Your auditors want proof of continuous control, not point-in-time snapshots
- You want to define your own baseline: Your security requirements don't match Microsoft's generic recommendations
The Hybrid Approach
Here's how mature organizations use both:
- Use Secure Score for discovery: Let it surface features and capabilities you might have missed
- Define your own baseline: Decide which recommendations apply to your context
- Implement continuous monitoring: Ensure your actual configuration matches your baseline
- Review Secure Score quarterly: See if new recommendations are relevant to your baseline
- Ignore score optimization: Focus on your baseline compliance, not the number
Secure Score becomes an input to your security program, not the measure of it.
Making the Transition
If you're currently relying on Secure Score, here's how to transition to continuous monitoring:
Week 1: Baseline Assessment
- Document your current Secure Score and what it includes
- Identify which recommendations you've implemented
- Note which recommendations you've intentionally skipped and why
Week 2: Define Your Baseline
- Review your compliance requirements (SOC 2, ISO 27001, etc.)
- Map required controls to specific Microsoft 365 settings
- Document exceptions with business justification
Week 3: Implement Monitoring
- Connect TrueConfig to your tenant
- Configure your baseline controls
- Run initial assessment to identify gaps
Week 4: Operationalize
- Review deviation alerts daily
- Remediate findings or document exceptions
- Enable auto-remediation for low-risk controls
Within a month, you'll have transitioned from score-watching to actual security assurance.
The Bottom Line
Microsoft Secure Score is a useful starting point, but it's not a security program. It measures potential, not reality. It can't detect drift. It doesn't align with compliance frameworks. And a high score can create dangerous false confidence.
Continuous monitoring answers the question that actually matters: "Is my tenant configured correctly, right now?"
When you can answer that question with confidence, based on your own baseline, with complete audit evidence, you've moved beyond the limitations of a single number.
Your security posture deserves more than a score.
TrueConfig provides continuous configuration monitoring for Microsoft 365 identity and access. Define your security baseline, detect drift automatically, and maintain compliance evidence without chasing arbitrary scores. Start your free trial