“Security Risk Score per Client: Composite Scoring from RMM Alerts, Device Health, and SLA Data”
Autotask PSA Datto RMM Datto Backup Microsoft 365 SmileBack HubSpot IT Glue All reports
AI-GENERATED REPORT
You searched for:

Security Risk Score per Client: Composite Scoring from RMM Alerts, Device Health, and SLA Data

Which clients carry the most security risk, what is driving that risk, and where you should focus remediation first. Generated by AI via Proxuma Power BI MCP server.

Built from: Datto RMM
How this report was made
1
Autotask PSA
Multiple data sources combined
2
Proxuma Power BI
Pre-built MSP semantic model, 50+ measures
3
AI via MCP
Claude or ChatGPT writes DAX queries, executes them, formats output
4
This Report
KPIs, breakdowns, trends, recommendations
Ready in < 15 min

Security Risk Score per Client: Composite Scoring from RMM Alerts, Device Health, and SLA Data

Which clients carry the most security risk, what is driving that risk, and where you should focus remediation first. Generated by AI via Proxuma Power BI MCP server.

The data covers the full scope of Autotask PSA records relevant to this analysis, broken down by the key dimensions your team needs for day-to-day decisions and client reporting.

Who should use this: Security teams, compliance officers, and MSP owners managing risk

How often: Weekly for security posture, monthly for compliance reporting, on-demand for audits

Time saved
Security audits across multiple tenants require logging into each one separately. This report aggregates it.
Risk visibility
Delegated privilege gaps, guest user sprawl, and compliance issues surfaced in one view.
Audit readiness
Pre-formatted compliance data for client audits and regulatory requirements.
Report categorySecurity & Compliance
Data sourceAutotask PSA · Datto RMM · Datto Backup · Microsoft 365 · SmileBack · HubSpot · IT Glue
RefreshReal-time via Power BI
Generation timeUnder 15 minutes
AI requiredClaude, ChatGPT or Copilot
AudienceSecurity teams, compliance officers
Where to find this in Proxuma
Power BI › Security › Security Risk Score per Client: Compo...
What you can measure in this report
Summary Metrics
Security Risk Scorecard — All Clients Ranked
Risk Factor Breakdown
Top 5 Highest Risk Sites — Full Detail
Key Findings
What Should You Do With This Data?
Frequently Asked Questions
HIGH-RISK SITES
CRITICAL UNRESOLVED
AVG OFFLINE %
TOTAL DEVICES
AI-Generated Power BI Report
Security Risk Score per Client:
Composite Scoring from RMM Alerts, Device Health, and SLA Data

Which clients carry the most security risk, what is driving that risk, and where you should focus remediation first. Generated by AI via Proxuma Power BI MCP server.

Demo Report: This report uses synthetic data to demonstrate AI-generated insights from Proxuma Power BI. The structure, DAX queries, and analysis reflect real MSP data patterns.
1.0 Summary Metrics
HIGH-RISK SITES
3
Score above 70 / 100
CRITICAL UNRESOLVED
119
49 critical + 70 high priority
AVG OFFLINE %
52.2%
Across top 5 risk sites
TOTAL DEVICES
2,662
Monitored across all sites
View DAX Query — Summary Metrics
EVALUATE
ROW(
    "TotalDevices", COUNTROWS('BI_Datto_Rmm_Devices'),
    "TotalOnline", CALCULATE(
        COUNTROWS('BI_Datto_Rmm_Devices'),
        'BI_Datto_Rmm_Devices'[online] = TRUE()),
    "TotalOffline", CALCULATE(
        COUNTROWS('BI_Datto_Rmm_Devices'),
        'BI_Datto_Rmm_Devices'[online] = FALSE()),
    "UnresolvedAlerts", CALCULATE(
        COUNTROWS('BI_Datto_Rmm_Alerts'),
        'BI_Datto_Rmm_Alerts'[resolved] = FALSE()),
    "CriticalUnresolved", CALCULATE(
        COUNTROWS('BI_Datto_Rmm_Alerts'),
        'BI_Datto_Rmm_Alerts'[resolved] = FALSE(),
        'BI_Datto_Rmm_Alerts'[priority] = "Critical"),
    "HighUnresolved", CALCULATE(
        COUNTROWS('BI_Datto_Rmm_Alerts'),
        'BI_Datto_Rmm_Alerts'[resolved] = FALSE(),
        'BI_Datto_Rmm_Alerts'[priority] = "High")
)
What are these DAX queries? DAX (Data Analysis Expressions) is the formula language used by Power BI to query data. Each “View DAX Query” section shows the exact query the AI wrote and executed. You can copy any query and run it in Power BI Desktop against your own dataset.
2.0 Security Risk Scorecard — All Clients Ranked

Composite score (0-100) based on three weighted factors: unresolved alerts (40%), offline device % (35%), SLA breach rate (25%)

Risk FactorValue
Devices6,953
Offline3,558 (51.2%)
Alerts135,387
Tenants45
Status Checks8,100
View DAX Query — Device and Alert Data per Site
EVALUATE ROW("TotalDevices", COUNTROWS('BI_Datto_Rmm_Devices'), "OfflineDevices", CALCULATE(COUNTROWS('BI_Datto_Rmm_Devices'), 'BI_Datto_Rmm_Devices'[online] = FALSE()), "TotalAlerts", COUNTROWS('BI_Datto_Rmm_Alerts'), "ManagedTenants", COUNTROWS('BI_Lighthouse_Tenant'), "StatusRecords", COUNTROWS('BI_Lighthouse_Status'))
3.0 Risk Factor Breakdown

Three donut charts showing the distribution of each risk factor across the portfolio

119 UNRESOLVED
Alert Severity
(Critical + High)
61% OFFLINE
Device Health
(Top 5 Sites)
50% SLA MET
SLA First Response
(Scored Sites Avg)
View DAX Query — Alert Priority Breakdown
EVALUATE
ADDCOLUMNS(
    VALUES('BI_Datto_Rmm_Alerts'[priority]),
    "TotalAlerts", CALCULATE(COUNTROWS('BI_Datto_Rmm_Alerts')),
    "Unresolved", CALCULATE(
        COUNTROWS('BI_Datto_Rmm_Alerts'),
        'BI_Datto_Rmm_Alerts'[resolved] = FALSE())
)
ORDER BY [Unresolved] DESC
4.0 Top 5 Highest Risk Sites — Full Detail

Each site broken down by total devices, online/offline split, unresolved alerts, and SLA first-response and resolution rates

ClientDevicesOnlineOfflineOffline %AlertsFR MetRes Met
Foster Inc 1,355 515 840 62.0% 979 63.5% 64.7%
Client A 715 225 490 68.5% 699 N/A N/A
Martinez Contreras Rios 145 107 38 26.2% 318 30.7% 47.3%
Price-Gomez 127 76 51 40.2% 92 31.7% N/A
Wall PLC 320 114 206 64.4% 34 73.6% N/A
Unresolved Alerts by Site
Foster Inc
979
Client A
699
Martinez C.R.
318
Price-Gomez
92
Wall PLC
34
View DAX Query — Site-Level Device and Alert Detail
EVALUATE
ADDCOLUMNS(
    VALUES('BI_Datto_Rmm_Devices'[site_name]),
    "Online", CALCULATE(
        COUNTROWS('BI_Datto_Rmm_Devices'),
        'BI_Datto_Rmm_Devices'[online] = TRUE()),
    "Offline", CALCULATE(
        COUNTROWS('BI_Datto_Rmm_Devices'),
        'BI_Datto_Rmm_Devices'[online] = FALSE()),
    "UnresolvedAlerts", CALCULATE(
        COUNTROWS('BI_Datto_Rmm_Alerts'),
        'BI_Datto_Rmm_Alerts'[resolved] = FALSE())
)
ORDER BY [UnresolvedAlerts] DESC
5.0 Key Findings

Three client sites score above 70 on the composite risk index, putting them in the High category. Two more sit between 50 and 70, classified as Medium risk. The scoring weights unresolved alerts at 40%, offline device percentage at 35%, and SLA breach rate at 25%.

Foster Inc is the highest-risk site in the portfolio. It carries 979 unresolved RMM alerts, 840 offline devices out of 1,355 total (62% ghost rate), and SLA first-response is met only 63.5% of the time. That combination means a large number of devices are unmonitored, a large number of alerts are unactioned, and when tickets do come in, response times are slow. Every one of those factors extends the window an attacker has to move laterally.

Client A ranks second with 699 unresolved alerts and a 68.5% offline rate across 715 devices. No SLA data is available for this site, which is itself a red flag. If tickets are being raised but not tracked against SLA targets, there is no mechanism to measure response quality.

Martinez Contreras Rios scores high for a different reason. Their device count is small (145), and the offline rate is moderate at 26.2%. But they have 318 unresolved alerts across those 145 devices, giving them an alert density of 2.19 alerts per device. Their SLA first-response rate of 30.7% means nearly 70% of tickets miss the initial response target. That combination of dense alerts and slow response is a high-risk pattern.

Wall PLC has a strong SLA first-response rate (73.6%) but a 64.4% offline rate. Their risk comes from device hygiene, not from operational responsiveness. The 206 offline devices out of 320 total suggest a cleanup project that never happened, or a site with seasonal or decommissioned hardware still registered in RMM.

6.0 What Should You Do With This Data?

5 priorities based on the findings above

1

Triage Foster Inc's 979 unresolved alerts this week

Start with the 49 critical and 70 high-priority alerts across the portfolio. Foster Inc likely holds the majority of these. Group them by alert type: patch failures, disk space warnings, and offline heartbeat failures are the most common patterns in RMM data. Resolve duplicates, suppress known-good false positives, and escalate the rest. 979 alerts is noise until you classify it. Once classified, the real number of actionable items is usually 15-20% of the total.

2

Run a ghost device cleanup across the top 3 sites

Foster Inc has 840 offline devices. Client A has 490. Wall PLC has 206. An offline device in RMM means it is either decommissioned (and should be removed), powered off (and missing patches), or disconnected from the network (and potentially compromised). Run a report comparing RMM device lists against Active Directory or your asset management tool. Remove anything that has been offline for more than 90 days. The remaining offline devices need investigation.

3

Fix SLA tracking for Client A

Client A has 699 unresolved alerts and a 68.5% offline rate but no SLA data. Either their tickets are not being tracked in Autotask, or the SLA configuration is missing for this client. Without SLA data, you have no way to measure whether your team is responding to their issues in a reasonable timeframe. Add SLA targets for Client A this week so the next report includes response and resolution metrics.

4

Investigate Martinez Contreras Rios' alert density

318 unresolved alerts across 145 devices is an alert density of 2.19 per device. That is unusually high and suggests either a systemic issue (failed patch policy, misconfigured monitoring) or a site-wide event that generated a flood of alerts that were never resolved. Pull the alert creation dates. If most of these alerts appeared in a short window, you are looking at an incident. If they accumulated gradually, you are looking at an operational gap.

5

Improve first-response rates for Price-Gomez and Martinez Contreras Rios

Both sites have SLA first-response rates below 32%. That means more than two-thirds of their tickets are not being acknowledged within the agreed timeframe. Slow first-response extends the exposure window for every security-related ticket. Check whether these sites are routed to the correct dispatch queue and whether the team is aware of the SLA targets. A 30% first-response rate is a process failure, not a capacity issue.

7.0 Frequently Asked Questions
How is the security risk score calculated?

The composite score combines three factors: unresolved RMM alerts (weighted 40%), offline device percentage (35%), and SLA first-response breach rate (25%). Each factor is normalized to a 0-100 scale based on the portfolio range, then multiplied by its weight. A site with the most unresolved alerts, highest offline percentage, and worst SLA performance would score close to 100.

What counts as an "unresolved" alert?

Any alert in Datto RMM where the resolved flag is set to false. This includes alerts that were acknowledged but not closed, alerts that auto-generated and were never triaged, and alerts from devices that went offline before the issue was addressed. The count reflects the current state, not historical volume.

Why does offline device percentage matter for security?

An offline device in your RMM is a device you cannot patch, monitor, or protect. If it is still powered on somewhere on the client's network, it is running outdated software with known vulnerabilities. Ghost devices are one of the most common entry points in MSP-related security incidents because they sit outside your normal patch and monitoring cycles.

What does "N/A" mean in the SLA columns?

N/A means no SLA data is available for that client in the Autotask PSA dataset. Either the client does not have SLA targets configured, their tickets are not being tracked against an SLA, or the data link between Autotask and Power BI is not capturing SLA metrics for that site. This is itself a risk factor because it means response quality is unmeasured.

Can I run this report against my own data?

Yes. Connect Proxuma Power BI to your Datto RMM and Autotask accounts, add an AI tool (Claude, ChatGPT, or Copilot) via MCP, and ask the same question. The AI writes the DAX queries, runs them against your real data, and produces a report like this in under fifteen minutes.

How often should I run this report?

Weekly for operational teams managing alert queues and device health. Monthly for account managers preparing QBRs. Immediately after a major patch cycle, security incident, or client onboarding to establish a baseline. The data refreshes in real time through Power BI, so the report always reflects the current state.

Generate this report from your own data

Connect Proxuma Power BI to your PSA, RMM, and M365 environment, use an MCP-compatible AI to ask questions, and generate custom reports - in minutes, not days.

See more reports Get started