The four Zero Trust pillars
Every Invoke-ZtAssessment test maps to one of four pillars. Siemserva preserves that tagging so you can filter the dashboard by pillar or drill into each one in the report.
Identity
MFA coverage, Conditional Access baselines, risk-based sign-in policy, privileged account hygiene, guest access controls.
Devices
Intune enrollment, compliance policy, device-based Conditional Access, OS patch posture, platform hardening.
Data
Sensitivity labels, DLP policy, SharePoint and OneDrive sharing posture, retention, information protection reach.
Network
Private access, named locations, trusted IP ranges, Global Secure Access posture, legacy protocol exposure.
Import in three steps
Run ZTA, hand the JSON to the Siemserva connector, view the result in the dashboard or a full HTML report.
Run the assessment
Install ZeroTrustAssessment from the PowerShell Gallery and run Invoke-ZtAssessment against your tenant.
Convert to Siemserva
Pipe the ZTA JSON through ConvertTo-SiemservaNdjson.ps1 to produce the shared wire format.
Render anywhere
Pipe to siemserva-win-x64.exe --reporter for an HTML report or add --dashboard for the live TUI.
Sample report excerpt
What a single ZTA finding looks like after Siemserva renders it, complete with Senserva Trustworthy AI summary, pillar tag, Severity, and remediation. This is the same shape native Siemserva findings use, so every dashboard filter and report surface works identically.