Obtain the software
Purchase the “Sitewide 365 day license” from the license shop. This enables you to audit all devices and verify the security posture of your network.
Start
Purchase
Deploy the SecurE8Auditor.ps1 script to all devices
Using a deployment technology such as Configuration Manager (SCCM) or Intune, deploy the script to all devices.
Here are instructions on how to do that.
Here are instructions on how to do that.
Deploy
Wait for the Magic
Within a few minutes of deploying, most devices will be completly audited and the results will be saved to the nominated network share.
Gather
Execute the Flight Deck.
Running the FlightDeck will perform the following operation.
- Ingest all the ML1 files in to its local database.
- Display the overall audit results in a single pane of glass, showing the number of machines effective across all mitigating strategies.

Execute
Uplift advice
SecurE8 provides remediation guidance for every control in the Essential Eight maturity model, delivering clear documentation and step‑by‑step instructions for performing security uplifts. It highlights the specific elements being assessed, enabling auditors to quickly identify required remediation actions and streamline the uplift process. By offering structured insights into security gaps and actionable recommendations, SecurE8 empowers auditors to remediate with confidence and accuracy, significantly reducing the time and resources typically needed for comprehensive security improvements.


Empower
Granular level ISM reporting
SecurE8 goes beyond providing a holistic view of compliance; it recognises that the true strength lies in the details. With SecurE8, you gain a comprehensive view across your entire organisation, pinpointing exactly which devices are not effectively meeting specific Information Security Manual (ISM) controls. This granular level of insight allows you to see precisely where compliance gaps exist and understand how they impact the broader security landscape. The software’s filtering and sorting capabilities further enhance this process, making it easy to identify problem areas and prioritise critical devices or controls that require immediate attention. This detailed, actionable perspective supports proactive security management, enabling more targeted and efficient remediation.

Detailed
Automatically send scheduled reports
With SecurE8, you can configure automated, scheduled reports to be sent at regular intervals, ensuring that stakeholders are consistently informed about compliance and security metrics. Each report includes an attached document containing detailed artifacts, which serve as concrete evidence of compliance activities and audit trails. These embedded artifacts streamline the verification process by providing auditors and security teams with direct access to supporting documentation, eliminating the need for time-consuming manual retrieval of records. This feature builds trust by delivering transparent, verifiable insights into the organisation’s security posture.


Report
Share the report with stakeholders
You are all done at this point. auditing your security posture across your entire organisation.
Complete
Celebrate
