Zero Trust Assessment How To Guide for Microsoft 365 Security

Microsoft’s Zero Trust Assessment gives you a structured way to understand how closely your Microsoft 365 tenant aligns with modern security expectations. It reviews core identity, device, access and logging configurations, then produces a clear report with practical guidance.

Never miss an article and subscribe, and don’t forget to subscribe to my YouTube channel, Control Alt Delete Tech Bits

What is the Zero Trust Assessment?

The Zero Trust Assessment is a PowerShell module created by Microsoft to automate the process of evaluating your tenant against the Zero Trust security model.

Rather than manually reviewing hundreds of settings across Entra ID, Conditional Access, Intune, authentication methods and audit logs, this tool pulls everything together in one assessment and produces a detailed HTML report.

The report gives you:

  • A high-level overview of your tenant’s identity and device posture
  • A summary of how many tests passed, failed or require investigation
  • Clear descriptions of each check
  • Risk ratings
  • Potential user impact
  • Admin effort required
  • Direct remediation guidance

It’s completely read-only, meaning it won’t change anything in your environment.

Prerequisites Before You Begin

The assessment is straightforward to run, but a few things need to be in place:

PowerShell version

Use PowerShell 7 or later.

Permissions

Two roles are needed:

  • First run: Global Administrator (to grant application permissions)
  • Subsequent runs: Global Reader

Network requirements

Your device must be able to connect to:

  • PowerShell Gallery
  • Microsoft Graph
  • Azure login endpoints

Azure subscription (optional)

If you want logging checks against Azure Monitor or Sentinel, a subscription helps, but the tool will still run without it.

For this article, I am going to assign global admin to user Olavi King for 2 hours to run the assessment tool so they can grant application access using Privileged Identity Management. Follow along below

13 STEPS

1. The first step is to open Privileged Identity Management – Microsoft Entr… and click Microsoft Entra roles

2. Click Assign Eligibility

3. Type Filter

4. Click Global Administrator

5. Click Add assignments

6. Click No member selected

7. Click Select row

8. Click Select

9. Click Next >

10. Click Permanently eligible

11. Click Assign

12. With your mouse, click and drag Global Administrator, then drop it on here

12b. Drop

13. That’s it. You’re done.

Here’s an interactive tutorial

https://www.iorad.com/player/2646992/Entra-Microsoft—How-to-untitled-task-name



Next step

Install the Zero Trust Assessment Module

Open PowerShell 7 and run:

Install-Module ZeroTrustAssessment -Scope CurrentUser
Install-Module ZeroTrustAssessment -Scope CurrentUser

You will see a warning about the PowerShell Gallery being an untrusted repository. Choose the option to continue.

Zero Trust Assessment Module untrusted repository
Zero Trust Assessment Module untrusted repository

Type A, then enter

Install Zero Trust Assessment Module
Install Zero Trust Assessment Module

Once installation finishes, confirm the module is available:

Get-Module ZeroTrustAssessment -ListAvailable
Get-Module ZeroTrustAssessment -ListAvailable




Zero Trust Assessment Installed
Zero Trust Assessment Installed

Authenticate and Connect to Your Tenant

Use the following command to connect the module to Microsoft Graph:

Connect-ZtAssessment
Connect-ZtAssessment

You’ll be prompted to sign in. Choose your account and grant the read-only permissions requested. These permissions allow the tool to query Entra ID, Conditional Access, device data and app registrations.

Microsoft also shows a list of permissions such as:

  • AuditLog.Read.All
  • Directory.Read.All
  • DeviceManagementConfiguration.Read.All
  • Policy.Read.ConditionalAccess
  • IdentityRiskEvent.Read.All

A second login prompt for Azure may appear. If you aren’t using Azure Monitor or Sentinel, you can close it.

Once authenticated, PowerShell confirms the connection.

Zero Trust Assessment sign in
Zero Trust Assessment sign in
Zero Trust Assessment permissions
Zero Trust Assessment permissions

Run the Zero Trust Assessment

Start the assessment using:

Invoke-ZtAssessment
Invoke-ZtAssessment

If you don’t have Visual C++ Redistributable, you will get the message below:

Visual C++ Redistributable
Visual C++ Redistributable

Run the Zero Trust Assessment

Start the assessment using:

Invoke-ZtAssessment running
Invoke-ZtAssessment running

The assessment begins collecting data from your tenant. Your screenshots show this clearly:
service principals being exported, device data collected, role assignments checked and sign-in logs processed.

Depending on the size of your environment:

  • Small tenants: 20–30 minutes
  • Medium tenants: 1–3 hours
  • Large tenants: 24 hours+

When it completes, you’ll see a confirmation in the console showing the HTML report location : C:\Windows\System32\ZeroTrustReport

Zero Trust Assessment completed
Zero Trust Assessment completed

Reviewing the Zero Trust Assessment Report

The report opens in your browser and gives a full overview of your tenant. Your screenshots show the exact pages users will see.

Overview dashboard

The dashboard includes:

  • Tenant stats (users, groups, devices, apps)
  • Authentication methods for privileged users
  • Sign-in protection (CA and MFA coverage)
  • Device compliance
  • Device ownership
  • Total tests passed vs total tests available

This gives a quick impression of your tenant’s health.

Identity

The Identity tab shows every identity-related test, including:

  • MFA enforcement
  • Password protection
  • Admin account configuration
  • Conditional Access coverage
  • Guest restrictions
  • App credentials
  • Sign-in risk features

Each item shows:

  • Risk rating
  • Status (Passed, Failed, Investigate)

Click any item for a full explanation.

Devices

The device section highlights:

  • Device compliance
  • Device platforms
  • Managed vs unmanaged breakdown
  • Protection policies
  • App management status

Again, each test can be opened for deeper detail.

Zero Trust Assessment report homepage
Zero Trust Assessment report homepage
Zero Trust Assessment report users
Zero Trust Assessment report users
zero trust assessment report identity
zero trust assessment report identity

What To Do Once You Have the Report

Once you’ve run the Zero Trust Assessment and opened the report, the next step is understanding what the results mean and more importantly, how to act on them.

Start with the high-level summary

The first thing the report shows you is a high-level summary of:

  • The number of tests passed
  • The total number of tests available for your licence
  • Identity and device posture
  • Authentication method usage
  • Conditional Access coverage

This gives you an immediate understanding of where your tenant sits on the Zero Trust maturity scale.

Authentication overview

The privileged and non-privileged user authentication charts show:

  • How many users are using weak methods
  • How many users rely on phishable MFA
  • Whether admins are using strong methods such as Passkeys or Windows Hello for Business

If you see “Single factor” listed against privileged accounts, that’s an immediate priority.

Analyse sign-in behaviour

The report inspects your sign-in logs to show how Conditional Access is being applied. It highlights:

  • Sign-ins with no CA policy
  • Sign-ins with CA but no MFA enforcement
  • Sign-ins from unmanaged or non-compliant devices

This allows you to quickly spot gaps in enforcement.
For example:

  • A large amount of unmanaged device sign-ins = tighten Conditional Access
  • Low MFA coverage = enforce stronger authentication

Review device health

The Devices section gives you a breakdown of:

  • Desktop vs mobile usage
  • Compliance status
  • Enrolment method
  • Ownership (corporate vs personal)

This helps you spot issues such as:

  • A high percentage of unmanaged devices
  • Devices not meeting compliance
  • Outdated platforms

This is essential for Zero Trust as device state directly affects access decisions.

Identity and Devices test details

In the Identity and Devices tabs, each test can be opened to show:

  • What Microsoft checked
  • Why your tenant failed (if applicable)
  • The risk level (High, Medium, Low)
  • The impact to end users
  • The effort required to fix it

Use the remediation guidance properly

Each test includes a “How to fix” section.
Microsoft explains that this tells you exactly:

  • What needs changing
  • Why it matters
  • Where to make the change
zero trust assessment activity logs and reports in Microsoft Entra
zero trust assessment activity logs and reports in Microsoft Entra

The report often links directly to the relevant portal area, such as:

  • Conditional Access
  • Authentication methods
  • Device compliance policies
  • App registrations
  • User settings

This turns the report into a task list you can work through systematically.

Enable advanced columns if required

You can enable additional columns within the report such as:

  • Minimum licence required
  • Admin effort
  • User impact

This helps with prioritisation and planning, especially when reporting to leadership or security boards.

Build your remediation plan

Microsoft recommends breaking the fixes down into three groups:

High risk

Fix first, these often include:

  • Weak admin authentication
  • No MFA enforcement
  • Unprotected privileged accounts
  • Unmanaged or non-compliant device access
  • Long-lived app secrets

Medium risk

Important but not critical:

  • Conditional Access refinements
  • Guest user restrictions
  • Password policy improvements

Low risk

Lower urgency items:

  • Cosmetic configuration issues
  • Minor security hardening

Re-run the Zero Trust Assessment regularly

Microsoft suggests running the assessment:

  • After each major configuration change
  • Quarterly for regular security posture reviews
  • Before audits or compliance checks

This gives you:

  • Before/after comparisons
  • Evidence of continuous improvement
  • A measurable record of progress

You can uninstall by typing

uninstall zero trust assessment
uninstall zero trust assessment

Running the Zero Trust Assessment is one of the simplest ways to understand where your Microsoft 365 tenant stands today and what needs attention next. It gives clear, evidence-based findings that help you strengthen identity, tighten access controls and improve device security.

By turning the results into an action plan and reviewing progress regularly, you build a far stronger security posture without guesswork. The tool removes the complexity of finding configuration gaps and gives you a structured path forward.

If you’re responsible for securing a Microsoft 365 environment, the Zero Trust Assessment should be part of your routine. Run it, act on the results and repeat it on a regular cycle. This approach keeps your tenant aligned with modern security expectations and helps you stay ahead of risks.

Also checkout this article Restrict App Consent and Permissions Hardening Microsoft Entra Enterprise Apps

What is the Zero Trust Assessment?

The Zero Trust Assessment is a PowerShell-based tool created by Microsoft to review your Microsoft 365 tenant against Zero Trust security guidance. It checks identity, access, devices and logging, then generates a detailed HTML report with remediation steps.

Does the Zero Trust Assessment make changes to my tenant?

No. The tool is completely read-only. It collects configuration data through Microsoft Graph and produces a report based on what it finds. Nothing is modified during the assessment.

Who can run the assessment?

The first run requires a user with either the Global Administrator role or the Application Administrator role to grant the necessary permissions. After that, the assessment can be run with a Global Reader account.

How long does the assessment take?

It depends on the size of your tenant. Smaller environments may complete in 20–30 minutes. Medium environments typically take one to three hours. Very large tenants with thousands of identities and devices can take 24 hours or more.

Can I customise where the report is saved?

Yes. You can set a custom location with: Invoke-ZtAssessment -Path “C:\Reports\MyAssessment”

Is the tool free?

Yes. The module is published by Microsoft and is free to download and use. The number of available tests may vary depending on the licences in your tenant.

Does this replace Microsoft Secure Score?

No. Secure Score and the Zero Trust Assessment complement each other. Secure Score focuses on recommended actions, while the Zero Trust Assessment provides a wide view of configuration, identity health, device posture and authentication strength.

Merill Fernando has an in-depth video on YouTube

Tags: ,

Leave a Reply

Your email address will not be published. Required fields are marked *