Security Scores

Understand endpoint security posture with automated checks and compliance mapping.

How Scoring Works

Each agent receives a security score (0-100) based on automated checks that run periodically. The score is a weighted average of individual check results. A higher score means the endpoint is better aligned with security best practices.

View security scores from:

  • Agent Detail → Security tab — Score for a single endpoint
  • API: GET /api/agents/:id/security-score — Latest score and history

Score history is retained so you can track improvement or regression over time.

Security Checks

MaxRMM evaluates the following security checks on each endpoint:

Check What It Verifies Impact on Score
Disk Encryption (BitLocker) Whether the system drive has BitLocker or another full-disk encryption solution enabled High
Windows Firewall Whether Windows Firewall is enabled for all profiles (Domain, Private, Public) High
AV Definitions Current Whether antivirus definitions are up to date (within 3 days) High
Automatic Updates Whether Windows automatic updates are enabled Medium
Password Policy Whether local password policy meets minimum complexity and length requirements Medium
Guest Account Disabled Whether the built-in Guest account is disabled Low
Remote Desktop Disabled Whether RDP is disabled (or, if enabled, whether NLA is required) Medium

Each check returns a status (pass or fail) and evidence (the actual value found on the endpoint, e.g., "BitLocker: XtsAes256, Protection: On").

Compliance Framework Mapping

MaxRMM maps each security check to controls in common compliance frameworks. This helps MSPs demonstrate to their clients that endpoints meet regulatory requirements.

Supported Frameworks

Framework Description
HIPAAHealth Insurance Portability and Accountability Act — healthcare data protection
NIST 800-171Protecting Controlled Unclassified Information (CUI) in non-federal systems
SOC 2Service Organization Control — trust services criteria for SaaS/service providers
CIS BenchmarksCenter for Internet Security — prescriptive hardening standards for Windows

Mapping Examples

Check Framework Control Title
Disk EncryptionHIPAA164.312(a)(2)(iv)Encryption at Rest
Disk EncryptionNIST3.13.11CUI Encryption
Disk EncryptionSOC2CC6.1Logical Access - Encryption
Windows FirewallNIST3.13.1Boundary Protection
Windows FirewallCIS9.1.1Firewall Domain Profile
AV DefinitionsHIPAA164.312(a)(1)Access Control - AV
AV DefinitionsNIST3.14.1Malicious Code Protection
AV DefinitionsSOC2CC6.8Malware Detection
Automatic UpdatesCIS18.9.108.1.1Configure Auto Updates
Automatic UpdatesHIPAA164.312(c)(1)Patch Compliance
Guest AccountCIS1.1.1Guest Account Status
Remote DesktopCIS18.9.65.3.3.1RDP Access Control

Compliance Bridge API

Retrieve the full compliance mapping for an agent:

GET /api/agents/:id/compliance-bridge

Response includes:

  • agentId and hostname
  • score — current numeric score
  • checks — array of check results, each with status, evidence, and mapped frameworks
  • frameworks — list of all applicable frameworks for this agent's results

Score History

Track how an agent's security score changes over time:

GET /api/agents/:id/security-score?days=30

Returns the latest score plus a history array going back the specified number of days. Use this to identify trends and verify that remediation efforts are improving security posture.