Complete Feature List
An exhaustive reference of every capability in the TATER platform, organized by functional area. TATER provides unified compliance management across Microsoft 365, endpoint environments, and cloud infrastructure with automated scanning, remediation, and multi-framework reporting.
TATER covers 5,000+ compliance controls across 19 compliance frameworks, manages 234+ endpoint devices, includes 1,446+ automated remediation scripts, exposes 61 MCP tools for AI assistants and integrates with major ticketing systems, and provides 13 GRC modules (Risk Register, Exceptions, Audits, BCP/DR, Data Classification, Training, Control Testing, Change Control, Vendor Management, Questionnaires, Regulatory Changes, and Access Reviews) — all from a single pane of glass.
1. Compliance Management
The core of TATER: a unified control engine that evaluates, scores, and tracks compliance posture across every major security framework.
Unified Controls (V2 Engine)
5,000+ controls across 19 frameworks. The Unified Controls page is the primary view for managing compliance posture. Controls are organized by domain and evaluated using a threshold-based engine that supports boolean, compare, regex, composite, and custom evaluator types.
Learn moreMulti-Framework Support
19 compliance frameworks in a single platform. TATER maps controls to CIS Microsoft 365 Foundations Benchmark, CISA SCuBA Baselines, DISA STIGs, NIST 800-53, NIST CSF 2.0, NIST 800-171, ISO 27001, SOC 2, PCI-DSS v4.0.1, HIPAA, CIS Controls v8, UK Cyber Essentials, AU Essential Eight, and platform-specific CIS benchmarks for AWS, Docker, Kubernetes, macOS, Ubuntu/RHEL, MSSQL, and Cisco IOS.
Learn moreControl Detail Pages
Deep-dive view for every control. Each control has a dedicated detail page showing audit guidance, remediation steps, current status, scan history, evidence attachments, comments, and assignment tracking. Navigate via the View button on any control row.
Learn moreFilter Cascade
Three-level filtering: Authority, Framework, Application. Selecting an authority (e.g., CIS) narrows the available frameworks, and selecting a framework narrows the available applications. A separate Framework Category Filter provides a top-level split between Compliance and Vulnerability controls.
Learn moreDomain Grouping with Colored Chips
Visual categorization of controls by security domain. Controls are tagged with domains such as Identity, Data Protection, Network Security, and Threat Management. Each domain displays as a colored chip for rapid visual scanning across large control sets.
Learn moreTwo-Tier Visibility
Default controls plus organization-specific overlays. Default controls (visible to all organizations) are managed by SuperAdmins. Each organization can create its own controls that layer on top of the defaults, enabling customization without affecting other tenants.
Learn moreRisk Scoring
Weighted risk prioritization on a 0–10 scale. Each control receives a risk score calculated from severity, impact, and current compliance status. Scores drive prioritization across the dashboard, reports, and remediation workflows.
Learn moreSLA Tracking
Time-based remediation targets by severity. Critical findings require resolution within 24 hours, High within 7 days, Medium within 30 days, and Low within 90 days. SLA status is tracked per control and surfaced on the dashboard.
Learn moreCompliance Drift Detection
Persistent history with regression alerts. TATER compares successive scans to detect controls that have regressed from Pass to Fail. Drift alerts appear on the dashboard and in reports, helping teams catch configuration backsliding before it becomes a compliance gap.
Learn moreMITRE ATT&CK Mapping
15 adversary techniques mapped to compliance controls. Controls are linked to MITRE ATT&CK techniques, providing a threat-intelligence overlay that shows which adversary behaviors are mitigated by your current compliance posture.
Learn moreOverrides & Risk Acceptance
Formal risk acceptance with justification and expiry. Failing controls can be marked as accepted risk with a written justification, expiration date, and approval workflow. Overridden controls display as "Override" status rather than "Fail," and are tracked separately for audit purposes.
Learn moreControl Assignments
Assign controls to team members for accountability. Individual controls or bulk selections can be assigned to people in your organization. Assignees see their outstanding items on the My Dashboard page, and assignment status is visible in reports.
Learn more2. Standards & Frameworks
Manage regulatory standards, map controls across frameworks, and produce per-section compliance narratives for auditors.
Standards Detail Page
Granular section-level control mapping. Each standard has a detail page showing every section, the controls mapped to it, and the compliance percentage for that section. Navigate via the Standards page or from any framework view.
Learn moreNIST 800-53
325+ controls across 20 control families. Full coverage of the NIST 800-53 Rev 5 catalog, organized by family (AC, AU, CM, IA, SC, etc.) with control-to-standard mappings that chain through to other frameworks.
Learn moreISO 27001
93 Annex A controls mapped from NIST. ISO 27001:2022 Annex A controls are cross-referenced to TATER compliance controls via the NIST chain, enabling organizations to demonstrate ISO compliance from their existing scan data.
Learn moreSOC 2
50+ Trust Services Criteria. SOC 2 Type II criteria (CC, A, C, PI, P series) are mapped to TATER controls, supporting both readiness assessments and ongoing compliance monitoring for service organizations.
Learn morePCI-DSS v4.0
12 requirements with sub-control mapping. PCI-DSS v4.0 requirements are mapped to applicable TATER controls, covering network security, access control, vulnerability management, and monitoring.
Learn moreHIPAA
6 safeguard categories. HIPAA Security Rule safeguards (Administrative, Physical, Technical) plus Breach Notification and Privacy provisions are mapped to corresponding TATER compliance controls.
Learn moreCross-Standard Mapping via NIST Chain
Automatic framework bridging through NIST 800-53. Because all frameworks map to NIST 800-53 as a common denominator, TATER can show compliance coverage across any pair of standards — for example, how your CIS M365 controls satisfy ISO 27001 requirements.
Learn morePer-Org Narratives with AI Assist
Write compliance narratives for each standard section. Each organization can maintain narrative text per standard section, describing how they satisfy each requirement. AI Assist can generate draft narratives in three styles: Formal, Conversational, and Technical.
Learn moreFramework & Authority Management
Create and customize compliance frameworks. The Frameworks page lets administrators define custom frameworks, assign authorities, and map controls. The Authorities page manages the bodies that publish standards (CIS, NIST, DISA, CISA, etc.).
Learn more3. Automated Scanning
Multiple scanning methods for M365 cloud tenants and endpoint devices, with scheduling and deduplication built in.
M365 Cloud Scanning
Azure Automation runbook for tenant-wide compliance audits. The Scan-M365Cloud runbook authenticates via certificate and evaluates hundreds of controls across Exchange Online, SharePoint, Teams, Defender, Entra ID, Purview, Power BI, and Power Platform.
Learn moreEndpoint Scanning (Agent-Based)
PowerShell agent for on-premises and remote machines. The TATER Agent runs on Windows endpoints, evaluating CIS Benchmarks for Windows 11/Server, collecting hardware inventory, running speed tests, and uploading results to the API.
Learn moreServer-Side Graph API Scanning
Scan directly from the TATER API without runbooks. When tenant credentials are stored in Settings, the API can authenticate to Microsoft Graph and run compliance checks server-side, eliminating the need for Azure Automation infrastructure.
Learn moreScan Scheduling
Configurable scan frequency from hourly to weekly. The Settings > Scan Schedule page lets administrators configure recurring scans. Azure Automation schedules run M365 scans weekly and endpoint scans daily by default.
Learn moreScan Deduplication
Automatic duplicate detection at upload time. The scan upload endpoint compares the summary and a sample of 100 controls against existing scans. Duplicates increment a scanCount counter and update the lastScannedAt timestamp instead of creating a new document.
Learn moreScan Comparison
Diff between any two scans. Select two scans to see which controls changed status (Pass to Fail, Fail to Pass, etc.), enabling teams to understand exactly what changed between scan cycles.
Learn moreScan Grouping by Type
Collapsible groups: Cloud Runbook, Cloud, Endpoint, Speed Test. The Scans page always groups results by type, with user-selected sort order applied within each group. Each group is collapsible for easy navigation across large scan histories.
Learn moreFile-Based Scan Import
Upload JSON scan results from PowerShell scripts. For environments without Azure Automation, scan results can be exported as JSON files and uploaded through the Scans page import button.
Learn more4. Automated Remediation
One-click remediation for failing controls, powered by a two-runbook architecture that handles both Graph API and Exchange Online operations.
Covering Defender (11), Exchange Online (6), SharePoint Online (5), Entra ID (9), Power BI (2), Purview (1), CISA SCuBA (17), and Teams (2 guidance-only).
Remediation Script Library
1,446+ pre-built PowerShell scripts for common compliance fixes. Each script follows the REM_*.ps1 naming convention, accepts parameters and connection objects, and returns structured success/failure results. Scripts are stored in Azure Blob Storage and downloaded on demand.
Two-Runbook Architecture
PS7.2 primary with PS5.1 companion for Exchange operations. The primary runbook (Run-Remediation) handles Graph API-based remediations directly. When a script requires Exchange Online cmdlets, it automatically delegates execution to the PS5.1 companion runbook (Run-Remediation-EXO) and polls for completion.
Learn moreOne-Click Remediation
Trigger remediation from any control detail card. The Remediate button appears on unified control variation cards when a remediation script is available. Clicking it opens a confirmation modal with parameter inputs before triggering the runbook.
Learn moreRemediation Status Tracking
Progress bar with real-time polling. After triggering a remediation, the UI polls the API every 5 seconds for status updates (with a 10-minute timeout). Statuses include Queued, Running, Succeeded, Failed, and Timed Out.
Learn moreDedicated Remediation Page
Central view of all remediation activity. The Remediation page in the Security nav group shows all remediation jobs across the organization, with filtering by status, control, and date. Each job links back to the associated control.
Learn moreREST API Fallbacks
Graph token injection for environments without Graph SDK. Nine remediation scripts use direct REST API calls via $Connections.GraphToken when the Microsoft Graph PowerShell SDK is not available, ensuring compatibility across different Azure Automation configurations.
5. Endpoint Security
Deep integration with Microsoft Defender for Endpoint and Intune for vulnerability management and device compliance.
MDE Device Integration
Automatic discovery of Defender-managed devices. The Scan-Endpoints runbook queries the MDE API for device inventory, enriching TATER's device list with health status, risk scores, exposure levels, onboarding status, and last-seen timestamps.
Learn moreVulnerability Management with CVSS
Per-device CVE tracking with severity scores. Vulnerabilities discovered by MDE are imported per-device (to avoid memory issues with bulk queries), deduplicated, and displayed with CVSS severity ratings. The top Critical and High CVEs are highlighted for immediate attention.
Learn moreCISA Known Exploited Vulnerabilities
Cross-reference against actively exploited CVEs. The CISA KEV catalog (1,551+ entries) is downloaded during endpoint scans and cross-referenced with MDE findings. An alert banner highlights actively exploited vulnerabilities, including those linked to ransomware campaigns.
Learn moreEPSS Exploit Prediction Scores
Probability-based exploit likelihood scoring. EPSS (Exploit Prediction Scoring System) scores are displayed alongside CVEs, helping teams prioritize remediation based on the statistical likelihood of exploitation in the wild.
Learn moreSoftware Inventory
Full software catalog with version tracking. MDE software inventory data is imported and displayed with vendor, version, and weakness count. Software is sorted by vulnerability count, and end-of-life products are flagged for replacement.
Learn moreIntune Compliance Integration
Device configuration and compliance policy status. Intune-managed devices are pulled into the endpoint scan, showing compliance policy evaluation results, device configuration status, and managed-app inventory.
Learn moreDevice Bridging
Merge MDE devices into the TATER device inventory. The bridgeEndpointScanDevices() function enriches existing TATER devices with MDE data and auto-creates entries for newly discovered devices, providing a single unified device view.
Dashboard Tab Views
Six specialized views: Devices, Vulnerabilities, CISA KEV, Software, Recommendations, Intune. The Endpoint Security page provides summary KPI cards (Total Devices, Vulnerabilities by severity, CISA KEV count, Software count) and tab-based drill-down into each data category.
Learn more6. Smart App Discovery
Automatically discover and track enterprise software from endpoint scan data, with lifecycle version checking.
Trackable Software Allowlist
80 enterprise applications tracked by default. A curated allowlist of common enterprise software (browsers, productivity tools, security products, runtimes) filters endpoint scan results to surface only relevant applications, preventing clutter from obscure system components.
Learn moreendoflife.date Version Checking
Automated lifecycle status via public API. TATER queries the endoflife.date API to determine the support status of discovered software versions, identifying products that are approaching or have reached end-of-life.
Learn moreVersion Status Badges
Four visual indicators: Up to Date, Update Available, Major Update, EOL. Each discovered application displays a color-coded badge reflecting its version status, making it easy to identify which software needs attention across the fleet.
Learn moreAuto-Register Compliance Zones
Create compliance zones from endpoint scan discoveries. The autoRegisterDiscoveredApps() function automatically creates compliance zones for software that has vulnerabilities, 5+ device installs, or is end-of-life. Discovered zones are prefixed with disc- for identification.
7. Identity Security
Monitor non-human identities, track credential expiry, and detect excessive permissions across your Entra ID tenant.
Non-Human Identity Monitoring
Track app registrations and service principals. The Identity Security page surfaces all non-human identities in your Entra ID tenant, including app registrations, managed identities, and service principals, with risk indicators for each.
Learn more Coming soonApp Registration Credential Expiry
Proactive alerts for expiring secrets and certificates. TATER tracks the expiration dates of all app registration credentials and surfaces warnings for those approaching expiry, preventing authentication failures from expired secrets.
Learn more Coming soonService Principal Analysis
Visibility into service principal permissions and usage. Each service principal is analyzed for its assigned API permissions, last sign-in activity, and whether it has excessive or unused permissions that could be reduced.
Learn more Coming soonExcessive Permissions Detection
Flag identities with overly broad access. TATER evaluates the permissions granted to each non-human identity and flags those with high-privilege or broad-scope permissions that exceed what is typically needed for their stated purpose.
Learn more Coming soonIdentity Risk Scoring
0–100 risk score per identity. Each non-human identity receives a composite risk score based on permission scope, credential age, usage patterns, and owner assignment, enabling prioritized review of the riskiest identities.
Learn more Coming soonAccess Review Campaigns
Structured review workflows for permissions. The Access Reviews page allows administrators to create review campaigns that assign identity reviews to specific team members, track completion, and record approval or revocation decisions.
Learn more Coming soon8. Device Management
Comprehensive fleet inventory with hardware details, compliance status, and agent deployment tracking.
Fleet Inventory
Complete device catalog with hardware and OS details. The Devices page displays all known machines with type icons, manufacturer logos, OS version, compliance scores, and last-scanned dates. Devices are auto-discovered from endpoint scans and agent check-ins.
Learn moreAgent Deployment Tracking
Percentage metric for agent coverage. The dashboard tracks what percentage of known devices have the TATER agent installed and reporting, helping administrators identify gaps in endpoint coverage.
Learn moreMDE Health, Risk, and Exposure Status
Defender for Endpoint enrichment on device cards. Devices enriched from MDE show health status, risk score, exposure level, onboarding status, last-seen timestamp, and device tags in a dedicated Defender section on the device detail page.
Learn moreNetwork Speed Test
100MB download and 50MB upload tests from self-hosted files. The TATER agent includes a built-in speed test using files hosted on the TATER marketing site, eliminating dependency on third-party services. Results are stored per device for historical tracking.
Learn moreDevice Archive
Soft-archive decommissioned devices. Devices that are no longer active can be archived, removing them from the active fleet view while preserving their compliance history for audit purposes.
Learn moreDevice Detail Pages
Deep-dive view with vulnerabilities, software, and compliance. Each device has a detail page showing Defender status, top CVEs by severity, installed software with EOL flags, compliance scan results, and hardware specifications.
Learn moreDevice Management Page
Bulk operations and device configuration. The Manage Devices page provides administrative functions for device types, grouping, and bulk status changes across the fleet.
Learn more9. Policy Library
Template-driven policy document generator with variable substitution, Markdown preview, and branded PDF export.
11 Pre-Built Policy Templates
Covering core security policy domains. Templates include Information Security Policy, Acceptable Use, Incident Response, Access Control, Data Classification, Business Continuity, Change Management, Vendor Management, Remote Work, Data Retention, and Vulnerability Management.
Learn more Coming soonTemplate Variable Engine
{{varName}} syntax with typed inputs. Template variables support text, date, select, textarea, and number types. Variables are grouped (Organization, Document Control, Policy Details) and cached across template generation so common values like organization name only need to be entered once.
Template Browser
Visual template selection with metadata. The template browser displays category icons, difficulty dots (1–3), framework associations, and Recommended badges. Templates can be searched and filtered by category.
Learn more Coming soonOrganization Selector
Generate policies scoped to specific organizations. Both template-based and manual policy creation forms include an organization selector, allowing MSPs and multi-org users to generate branded policies for each client.
Learn more Coming soonPDF Export with Branding
Cover page, table of contents, and back page. Policies can be exported as professionally formatted PDFs that include organization branding (logo, company name, accent colors), an auto-generated table of contents, and a branded cover and back page.
Learn more Coming soonMarkdown Editing and Preview
Write policies in Markdown with live preview. The policy editor supports Markdown formatting (headers, bold, italic, lists) with a side-by-side preview panel. Generated policies are saved as drafts with the template ID and variable snapshot for easy re-generation.
Learn more Coming soon10. Security Questionnaires
Import, manage, and respond to security questionnaires with AI-powered assistance and control mapping.
Questionnaire Library
Central repository for all incoming questionnaires. The Questionnaires page lists all imported questionnaires with progress bars, question counts, and status indicators. Questionnaires can be created manually or imported from CSV files.
Learn more Coming soonCSV Import
Bulk-import questions from spreadsheets. Upload a CSV file with question text, categories, and expected response types to create a questionnaire in bulk, saving time on large vendor assessments.
Learn more Coming soonAI-Powered Response Generation
Draft answers using AI Assist. For each question, AI Assist can generate a response based on your organization's compliance data, mapped controls, and existing policy documents, significantly reducing the time to complete questionnaires.
Learn more Coming soonAuto-Map to TATER Controls
Link questionnaire questions to compliance controls. Questions can be mapped to relevant TATER controls, automatically pulling in compliance status and evidence to support questionnaire responses.
Learn more Coming soonCSV and PDF Export
Export completed questionnaires for submission. Finished questionnaires can be exported as CSV (for spreadsheet-based workflows) or PDF (for formal submission), including all responses, control mappings, and evidence references.
Learn more Coming soonPer-Question Progress Tracking
Track completion status for each question. Each question can be marked as Draft, In Progress, or Complete. The questionnaire detail page shows overall completion percentage and highlights unanswered questions.
Learn more Coming soon11. Incident Response Playbooks
Pre-built and customizable incident response playbooks with step-by-step execution tracking.
8 Pre-Built Playbook Templates
Common incident scenarios ready to execute. Templates cover scenarios such as phishing, malware, data breach, insider threat, ransomware, denial of service, account compromise, and supply chain attack. Each template defines steps, owners, and expected actions.
Learn more Coming soonStep-by-Step Execution with Timer
Guided incident response with time tracking. When an incident is activated, each step can be started, completed, or skipped individually. A timer tracks elapsed time per step and total incident duration for post-incident review.
Learn more Coming soonAction Types
Three categories: Automated, Investigation, Manual. Steps are classified by action type, making it clear which steps can be automated via remediation scripts, which require investigation, and which need manual human action.
Learn more Coming soonActive Incident Tracking
Badge counter in the sidebar for active incidents. The Playbooks nav item displays a red badge showing the number of currently active incidents, ensuring responders never miss an in-progress event.
Learn more Coming soonPer-Step Notes
Document findings and actions at each step. Each playbook step supports free-text notes for documenting what was found, what actions were taken, and any deviations from the planned response procedure.
Learn more Coming soon12. Vendor Risk Management
Track third-party vendors, assess their security posture, and manage ongoing risk through structured review workflows.
Vendor Registry
Central catalog of all third-party vendors with risk tiers. Each vendor entry includes contact information, data handling details, risk tier classification (Critical, High, Medium, Low), and the date of the last assessment.
Learn more Coming soonRisk Scoring
Composite score based on data sensitivity, access level, and certifications. Vendor risk scores combine factors including what data the vendor can access, the level of system access granted, and which security certifications they hold.
Learn more Coming soonAssessment Workflow
Three trigger types: Initial, Annual, Incident-Triggered. Vendor assessments can be scheduled on an annual cycle, triggered by a security incident, or initiated when a new vendor is onboarded. Each assessment tracks questionnaire completion and finding resolution.
Learn more Coming soonCertification Tracking
SOC 2, ISO 27001, PCI-DSS, HIPAA, FedRAMP, HITRUST. Vendor certification status is tracked with expiration dates, making it easy to identify vendors whose certifications have lapsed and need re-evaluation.
Learn more Coming soonVendor Detail Pages
Deep-dive into each vendor relationship. The vendor detail page shows assessment history, current risk posture, certification timeline, associated questionnaires, and notes from previous reviews.
Learn more Coming soon13. Evidence & Audit
Collect, organize, and present compliance evidence for internal and external auditors.
Auto-Capture Compliance Snapshots
Automatic evidence collection from scans. Each scan run generates point-in-time compliance snapshots that serve as evidence of the organization's security posture at that moment. Snapshots are immutable once created.
Learn moreEvidence Library
Searchable repository with date filtering. The Evidence Library page provides a central view of all compliance evidence, filterable by date range, control, framework, and evidence type. Evidence count badges appear on control detail pages.
Learn moreFile Evidence Upload
Attach CSV, PDF, XLSX, and image files to controls. Manual evidence (screenshots, exported reports, policy documents) can be uploaded and linked to specific controls or frameworks, supplementing automated scan evidence.
Learn moreAudit Package Report
Pre-assembled evidence bundle for auditors. The Reports page can generate an Audit Package that combines compliance scores, control status, override justifications, and evidence attachments into a single document suitable for external audit review.
Learn moreActivity Log (Audit Trail)
Searchable record of all create, update, and delete operations. The Activity Log page provides a filterable audit trail with entity type, action, user, date range, and detailed change deltas. Supports SIEM forwarding via syslog or webhook.
Learn more14. Reporting & Analytics
Dashboard visualizations, compliance reports, and data exports for every audience from board rooms to security operations.
Dashboard with Trend Chart
Stacked area chart showing compliance posture over time. The main Dashboard page displays KPI cards, a compliance trend chart using historical scan data, application-level compliance cards, and risk distribution metrics. Primary applications sort to the top with accent highlighting.
Learn moreMy Dashboard
Personalized view of assigned controls and tasks. The My Dashboard page shows controls assigned to the current user, pending overrides awaiting approval, and recent activity, providing a focused personal workqueue.
Learn moreClient Dashboard
Multi-client overview for managed service providers. The Client Dashboard (visible to ServiceProvider and SuperAdmin roles under MSP → Client Dashboard) provides a cross-organization view showing compliance posture, scan status, and alert counts for all managed clients in a single view.
Learn morePriority Distribution Ribbon
Visual severity breakdown at a glance. A horizontal ribbon graph on the dashboard shows the distribution of findings by priority (Critical, High, Medium, Low), providing an instant read on the overall risk profile.
Learn moreCompliance Drift Alerts
Dashboard alerts for compliance regressions. When controls regress from Pass to Fail between scans, drift alerts appear prominently on the dashboard, drawing immediate attention to configuration backsliding.
Learn moreFramework Compliance Percentages
Per-framework pass rate on the dashboard. Each framework card shows its current compliance percentage, control count, and trend direction, enabling quick comparison across regulatory requirements.
Learn moreCost Savings Report
Estimated value of automated compliance activities. The Reports page can generate a cost savings estimate based on the number of controls evaluated, scans completed, and remediations executed, quantifying the ROI of TATER adoption.
Learn moreTrust Center
Public-facing compliance posture page. The Trust Center provides a customer-facing view of your organization's compliance status, framework coverage, and security certifications. Suitable for embedding in public websites or sharing with prospective clients.
Learn moreEmbeddable Compliance Score Widget
HTML/JavaScript widget for external sites. The Settings > Widget page generates embeddable code that displays your compliance score on external websites, customer portals, or internal dashboards.
Learn moreCSV/Excel Export
Export any table to CSV or Excel. All data tables throughout the application (controls, scans, devices, vulnerabilities, software) support one-click CSV/Excel export for offline analysis or SIEM ingestion.
Learn moreMultiple Report Types
Executive Summary, Detailed, Framework-Specific, Gap Analysis, Fleet, and Audit Package. Reports are rendered client-side as printable HTML with support for PDF generation. Each report type is tailored to a specific audience and use case.
Learn moreCompliance Roadmap
Multi-phase remediation planning generated directly from scan results. The Compliance Roadmap feature organizes failing and manual-review controls into a prioritized, phased remediation plan. It supports a Phase 0 Discovery phase for manual-review controls, cascading phase durations, MSP billing columns (estimated hours, billing rate, project cost), and multiple roadmaps per organization for tracking different initiatives in parallel.
Learn moreManual Configuration Collection
Tenable-style manual evidence collection for offline or air-gapped systems. The Config Collection feature allows administrators to upload configuration files (JSON exports, registry outputs, CSV baselines) and have TATER evaluate them against control thresholds — providing compliance assessment without network access to the target system. Useful for SCIF environments, lab networks, and devices that cannot run the TATER agent directly.
15. Integrations
Connect TATER to your existing security toolchain with SIEM, ticketing, communication, and notification integrations.
The Settings > Integrations page provides a unified marketplace with 41 integrations across SIEM, ticketing, communication, and automation categories.
SIEM: Syslog (RFC 5424 CEF)
Forward audit events via syslog in Common Event Format. TATER can send all audit log events to a SIEM endpoint via UDP or TCP syslog, formatted according to RFC 5424 with CEF (Common Event Format) payloads for standardized parsing.
Learn moreSIEM: Webhook (HMAC-Signed)
HTTPS webhook with SHA-256 HMAC signatures. Audit events can be forwarded to any HTTPS endpoint as JSON payloads. Each request includes an X-TATER-Signature header with an HMAC-SHA256 signature for payload verification.
SIEM: Splunk HEC
Direct integration with Splunk HTTP Event Collector. Configure a Splunk HEC token and endpoint to send TATER events directly to Splunk indexes without intermediate syslog infrastructure.
Learn moreSIEM: Azure Sentinel
Native Azure Sentinel workspace integration. Send TATER compliance events to an Azure Sentinel workspace for correlation with other security signals in your Microsoft security ecosystem.
Learn moreTicketing: Jira
Create and sync Jira tickets from failing controls. Failing controls can generate Jira issues automatically, with bidirectional status sync to keep TATER and Jira aligned on remediation progress.
Learn moreTicketing: ServiceNow
ServiceNow incident and task creation. Integration with ServiceNow enables automatic incident creation from compliance findings, linking TATER controls to ServiceNow CMDB items and change management workflows.
Learn moreTicketing: Generic Webhook
Send events to any ticketing system via webhook. For ticketing systems not directly supported, a generic webhook integration sends structured JSON payloads that can be consumed by any system with an HTTP endpoint.
Learn moreCommunication: Microsoft Teams
Teams channel notifications for compliance events. Configure a Teams incoming webhook to receive notifications about scan completions, drift alerts, remediation status changes, and SLA breaches in your Teams channels.
Learn moreCommunication: Slack
Slack channel notifications. Similar to Teams, Slack incoming webhook integration delivers compliance event notifications directly to designated Slack channels.
Learn moreCommunication: Email
Email notifications for compliance events. Configure email recipients and triggers to receive formatted email notifications for critical compliance events, scan results, and SLA breaches.
Learn moreNotification Rules Engine
Configurable rules for when and where to send alerts. The notification engine supports rules based on event type, severity, framework, and application, allowing fine-grained control over which events trigger which integrations.
Learn more16. Azure Resource Security
Scan Azure infrastructure resources for security misconfigurations across common resource types.
33 Security Checks
Covering 6 Azure resource categories. TATER evaluates Azure resources across Storage Accounts, Key Vaults, App Services, SQL Databases, Virtual Machines, and Network Security Groups for common security misconfigurations.
Learn more Coming soonAzure Resources Page
Dedicated view in the Security nav group. The Azure Resources page displays scan results organized by resource category, with pass/fail status, severity ratings, and remediation guidance for each check.
Learn more Coming soon17. Organization & User Management
Multi-tenant architecture with role-based access control, organization branding, and MSP white-label support.
Multi-Tenant Architecture
Complete data isolation between organizations. Every data record is partitioned by tenant, ensuring complete separation between organizations. Users can belong to multiple organizations and switch between them via the header organization selector.
Learn moreRole Hierarchy
Five roles with hierarchical permissions. SuperAdmin (cross-org, full access), ServiceProvider (cross-org for assigned clients), OrgAdmin (full access within org), Auditor (read plus audit operations), and Viewer (read-only). Roles are resolved from Azure AD app roles and organization memberships.
Learn moreOrganization Branding
Custom logo, colors, and tagline per organization. Each organization can customize its appearance with separate logos for dark and light themes, custom accent colors, a company name, and a tagline. Branding appears in the header, reports, and PDF exports.
Learn morePeople Management
Compliance contacts with Entra ID directory search. The People page manages stakeholders and compliance contacts. Users can be searched via the Microsoft Graph API directory, and people records link to control assignments and access reviews.
Learn moreMSP White-Label Portal
Service Provider view with client onboarding. MSPs see a dedicated portal with all their managed clients, per-client compliance scores, and the ability to onboard new client organizations. White-label branding ensures the MSP's brand is presented to end clients.
Learn moreOrganization Management (SuperAdmin)
Create and manage organizations and memberships. SuperAdmins can create new organizations, add members by email (auto-resolved to OID on first login), assign per-org roles, and configure organization-level settings including remediation enablement and webhook URLs.
Learn moreRegistered Users
View and manage all authenticated users. The Registered Users page (SuperAdmin-only) shows every user who has authenticated, their global role, last login, and organization memberships. Global roles (SuperAdmin, ServiceProvider) are assigned here.
Learn moreUser Profile
Personal profile with theme and notification preferences. The Profile page shows the current user's identity, role assignments, organization memberships, and preferences for notifications and display theme.
Learn more18. AI-Powered Features
AI Assist leverages language models to accelerate compliance documentation, questionnaire responses, and remediation guidance.
AI Assist for Compliance Narratives
Three prompt styles: Formal, Conversational, Technical. On the Standards Detail page, AI Assist generates draft compliance narratives for each standard section based on your mapped controls and their current status. Narratives can be edited and saved per organization.
Learn moreAI Assist for Questionnaire Responses
Draft answers from compliance data. When responding to security questionnaires, AI Assist can generate responses that reference your actual control status, policy documents, and certification data, producing accurate answers grounded in real evidence.
Learn moreAI Assist for Control Remediation
Guidance for filtered control sets. AI Assist can analyze a filtered set of failing controls and generate a prioritized remediation plan with step-by-step instructions, estimated effort, and dependency ordering.
Learn moreBulk Narrative Generation
Generate narratives for all sections at once. Rather than generating narratives one section at a time, the bulk generation feature processes all sections of a standard in sequence, producing a complete set of compliance narratives for auditor review.
Learn more19. TATER Agent
Endpoint agents for on-premises compliance scanning, available in PowerShell and .NET versions.
PowerShell Agent (v1.3.x)
Lightweight endpoint scanner for Windows machines. The PowerShell agent (TATER-Agent.ps1) runs compliance scans against CIS Benchmarks for Windows 11/Server, collects hardware inventory, performs speed tests, and uploads results to the TATER API.
Learn more.NET Agent (v2.1.9)
Windows Service with system tray UI. The .NET 8 agent runs as a Windows Service for headless operation with an optional system tray application for status visibility and manual scan triggering. Built with C# targeting .NET 8.
Learn moreMSI Installer
WiX Toolset v4 installer with silent install support. The MSI installer (TATER-Agent.msi) supports silent deployment via Intune, SCCM, or Group Policy. Custom actions are built as AnyCPU to ensure compatibility with the 32-bit MSI process. Configurable parameters include API URL and organization ID.
Learn moreAuto-Update with SHA256 Verification
Automatic version checking and secure update. The agent checks GET /api/agent/version (no authentication required) on each run. If a newer version is available, it downloads the MSI from the TATER marketing site, verifies the SHA256 hash, and installs the update.
System Tray with TATER Icon
Minimal UI presence with status indicators. The system tray icon provides at-a-glance agent status (running, scanning, error) and a context menu for manual scan triggering, viewing logs, and opening the TATER application. The taskbar entry is hidden to avoid clutter.
Learn moreSelf-Hosted Speed Test Files
100MB and 50MB test files. Speed test files are self-hosted, eliminating dependency on third-party CDN size limits. Results are stored per device for historical comparison.
Learn moreHistory Cleanup
Automatic log rotation keeping last 10 entries. The agent automatically cleans up old log files, scan results, and speed test data on each run, keeping only the most recent 10 entries of each type to prevent disk space accumulation.
Learn more20. Platform & Infrastructure
The technical foundation that powers TATER, from the API to deployment pipelines and developer tools.
Serverless API
Serverless API with automatic scaling. The TATER API provides automatic scaling, consumption-based pricing, and sub-second cold starts. All endpoints validate JWT tokens and enforce role-based access control.
Learn more Coming soonCloud Database
Multi-tenant data storage with automatic provisioning. All data is stored with tenant-level partitioning, ensuring complete isolation between organizations. Data stores are auto-provisioned on first access, handling first-run scenarios gracefully.
Learn more Coming soonAzure Automation Runbooks
Four runbooks for scanning and remediation. Scan-M365Cloud (PS5.1, weekly), Scan-Endpoints (PS5.1, daily), Run-Remediation (PS7.2, on-demand), and Run-Remediation-EXO (PS5.1, on-demand). All authenticate via certificate from Key Vault with Managed Identity permissions.
Learn moreCI/CD via Azure DevOps
Three pipelines auto-deploying on push to main. The API, Frontend, and Runbook deploy pipelines trigger on path-specific changes to the main branch, ensuring continuous delivery of updates.
Learn more Coming soonTwo Static Web App Architecture
Separate SWAs for marketing and application. The marketing site (www.tatersecurity.com) and the application (app.tatersecurity.com) are deployed to separate Azure Static Web Apps because they require different root documents and routing configurations.
Learn more Coming soonInteractive Runbook Creation Wizard
3-step guided setup for Azure Automation resources. The Settings → Cloud Scanning page includes a wizard that walks administrators through creating Azure Automation resources, generating resource names, and configuring the scanning infrastructure.
Learn moreQA Test Suite
74 automated tests with issue tracking integration. The automated test suite validates API endpoints, data integrity, and frontend syntax. Failed tests automatically create bug work items in the issue tracker.
Learn more Coming soonAPI Rate Limiting
100 requests per minute per client. The API enforces rate limiting to prevent abuse and ensure fair resource allocation across tenants. Rate limit headers are included in API responses for client-side awareness.
Learn more Coming soonAES-256-GCM Credential Encryption
Tenant credentials encrypted at rest. Client secrets and sensitive configuration are encrypted using AES-256-GCM before storage. Encryption keys are managed securely via a dedicated key management service.
Learn more Coming soonAPI Key Management
SHA-256 hashed keys with prefix display. API keys for automation authentication are hashed with SHA-256 before storage. Only the key prefix is displayed in the UI after creation. Keys support rotation and revocation.
Learn moreDual Authentication Model
Entra ID (RS256) and local password (HS256) authentication. The API supports both Microsoft Entra ID JWT tokens (RS256 validation against the OIDC discovery endpoint) and local password authentication (HS256) for environments without Entra ID.
Learn more21. Settings & Configuration
All the configuration pages accessible from the Settings nav group in the sidebar.
Branding
Logo, company name, tagline, and accent colors. Customize the application appearance per organization with separate dark and light theme logos and accent colors. Branding cascades into reports and PDF exports.
Learn moreTenant Credentials
Store M365 tenant credentials for server-side scanning. Configure tenant ID, client ID, and authentication method (secret or certificate) for each M365 tenant. Credentials are encrypted at rest with AES-256-GCM.
Learn moreAPI Keys
Generate and manage API keys for programmatic access. Create API keys for runbook authentication and external integrations. Keys are SHA-256 hashed; only the prefix is shown after creation.
Learn moreSIEM Configuration
Configure syslog and webhook SIEM destinations. Set up syslog endpoints (UDP/TCP, CEF format) and webhook URLs (HMAC-signed) for forwarding audit events to external SIEM platforms.
Learn moreIntegrations Marketplace
41 integrations across 5 categories. Browse and configure SIEM, ticketing, communication, and automation integrations from a unified marketplace interface.
Learn moreCompliance Configuration
Compliance zones and application scoping. Define which M365 applications (Exchange, SharePoint, Teams, etc.) are in scope for each organization, with primary application flagging for dashboard prioritization.
Learn moreRemediation Settings
Per-org remediation enablement and webhook configuration. Enable or disable automated remediation per organization, configure the remediation webhook URL, and set the app registration ID used for runbook authentication.
Learn moreScan Schedule
Configure recurring scan frequency and timing. Set scan schedules from hourly to weekly intervals with specific time-of-day preferences for M365 cloud scans and endpoint scans.
Learn moreScript Template
PowerShell script template for custom control scripts. View and customize the template used for generating new compliance control evaluation scripts.
Learn moreScan Commands
Command builder for manual scan execution. Generate ready-to-use PowerShell commands for running scans with the correct parameters for your environment, including API URL, tenant ID, and output paths.
Learn moreAgent Management
KPI dashboard, MSI download, and runbook wizard. Monitor agent deployment coverage, download the latest MSI installer, view silent install commands for mass deployment, and access the interactive runbook creation wizard.
Learn moreRecycle Bin
Recover soft-deleted items. Items deleted from the application are moved to the Recycle Bin where they can be restored or permanently removed. Covers controls, overrides, catalog items, and other data types.
Learn moreCompliance Widget
Generate embeddable compliance score HTML. Create a JavaScript/HTML snippet that displays your organization's compliance score on external websites or internal portals. Customizable colors and size.
Learn moreSample Data Seeding
Populate the platform with demo data (SuperAdmin only). The Sample Data page seeds the database with example organizations, scans, controls, and overrides for demonstration and testing purposes.
Learn moreHelp & Documentation
In-app help page with links to documentation. The Help page provides quick links to all documentation pages, keyboard shortcuts, and version information.
Learn more22. Risk Management
Enterprise risk register with visual heat maps, quantitative scoring, and treatment plan tracking for a complete risk management lifecycle.
Risk Register
Central repository for all identified risks. The Risk Register page catalogs organizational risks with fields for likelihood, impact, risk category, owner, treatment plan, and residual risk. Each risk links to related compliance controls and mitigation activities.
Learn more Coming soonRisk Heat Map
5x5 likelihood-impact matrix with color-coded cells. The interactive heat map visualizes all risks on a likelihood vs. impact grid. Click any cell to drill into the risks at that intersection. Colors range from green (low) through amber (medium) to red (critical).
Learn more Coming soonQuantitative Risk Scoring
Annualized loss expectancy (ALE) calculations. Each risk can be scored quantitatively using Single Loss Expectancy (SLE) and Annual Rate of Occurrence (ARO) to calculate ALE. Supports both qualitative (Low/Medium/High/Critical) and quantitative scoring modes.
Learn more Coming soonRisk Treatment Plans
Four treatment options: Mitigate, Accept, Transfer, Avoid. Each risk has a treatment plan with status tracking, target dates, and responsible parties. Treatment progress is tracked on the risk detail page and summarized on the dashboard.
Learn more Coming soonRisk-to-Control Linkage
Map risks to compliance controls that mitigate them. Risks can be linked to one or more TATER compliance controls, creating a bidirectional relationship that shows which controls mitigate which risks and which risks are unmitigated.
Learn more Coming soon23. Exception & Waiver Management
Formal workflow for requesting, reviewing, and tracking compliance exceptions and policy waivers with approval chains and expiration enforcement.
Exception Request Workflow
Structured request forms with business justification. Users can submit exception requests specifying the control or policy, justification, compensating controls, requested duration, and risk impact assessment. Requests enter an approval queue visible to OrgAdmins.
Learn more Coming soonMulti-Level Approval Chain
Configurable approval workflow with escalation. Exception requests can require approval from one or more reviewers (OrgAdmin, CISO, Risk Committee). Approvals track who approved, when, and any conditions attached to the approval.
Learn more Coming soonAutomatic Expiry and Renewal
Time-bound exceptions with renewal reminders. All exceptions have an expiration date. The system sends renewal reminders before expiry and automatically reverts the control to its original status when an exception expires without renewal.
Learn more Coming soonCompensating Controls
Document alternative measures for excepted controls. Each exception can specify compensating controls that partially mitigate the risk introduced by the exception. Compensating controls are tracked and included in audit reports.
Learn more Coming soon24. Regulatory Change Management
Track regulatory updates, assess their impact on your compliance posture, and manage the transition to new requirements.
Regulatory Change Feed
Curated feed of framework and regulation updates. The Regulatory Changes page surfaces updates to compliance frameworks (CIS version bumps, NIST revisions, new CISA directives) with impact assessments and affected control counts.
Learn more Coming soonImpact Assessment
Automated gap analysis for regulatory changes. When a new regulation version is published, TATER identifies which existing controls are affected, which new controls are needed, and which can be retired, generating a transition plan.
Learn more Coming soonChange Tracking and Deadlines
Timeline view of regulatory compliance deadlines. Each regulatory change has an effective date, a transition period, and a compliance deadline. The system tracks progress toward each deadline and surfaces overdue transitions.
Learn more Coming soon25. Audit Management
Plan, execute, and track internal and external audits with evidence collection, finding management, and auditor collaboration.
Audit Planning
Define audit scope, objectives, and schedules. Create audit engagements with defined scope (frameworks, controls, date range), assigned auditors, and target completion dates. The audit plan links to relevant controls and evidence.
Learn more Coming soonFinding Management
Track audit findings from discovery to resolution. Each finding has a severity, description, affected controls, recommended remediation, and status (Open, In Progress, Resolved, Closed). Findings link back to the audit engagement and forward to remediation tasks.
Learn more Coming soonEvidence Collection Workflow
Request and track evidence from control owners. Auditors can create evidence requests assigned to specific people, with due dates and status tracking. Evidence submissions are linked to the audit engagement and archived for future reference.
Learn more Coming soonAudit Calendar
Calendar view of past and upcoming audits. The Audit Calendar displays all audit engagements on a timeline, showing overlapping audits, approaching deadlines, and historical audit cadence for compliance reporting.
Learn more Coming soon26. Business Continuity & Disaster Recovery
Document, test, and maintain business continuity and disaster recovery plans with impact analysis and recovery tracking.
BCP/DR Plan Library
Structured plan documents with version control. Create and maintain business continuity and disaster recovery plans with sections for scope, recovery objectives (RTO/RPO), critical processes, communication plans, and recovery procedures. Plans support versioning and approval workflows.
Learn more Coming soonBusiness Impact Analysis
Identify and prioritize critical business processes. The BIA module catalogs business processes with their dependencies, recovery priorities, maximum tolerable downtime, and financial impact estimates. Results feed into BCP plan development.
Learn more Coming soonTest and Exercise Tracking
Schedule and record BCP/DR tests. Plan tabletop exercises, walkthroughs, and full simulation tests. Record test results, lessons learned, and corrective actions. Track test frequency to satisfy audit requirements.
Learn more Coming soonRTO/RPO Tracking
Monitor recovery objectives across critical systems. Define Recovery Time Objectives and Recovery Point Objectives for each critical system. Track actual recovery performance against targets during tests and real incidents.
Learn more Coming soon27. Data Classification & Privacy
Classify data assets, track data flows, and manage privacy requirements across your organization.
Data Asset Inventory
Catalog data stores with classification labels. The Data Classification page inventories data assets (databases, file shares, SaaS applications, cloud storage) with classification levels (Public, Internal, Confidential, Restricted) and data types (PII, PHI, PCI, IP).
Learn more Coming soonData Flow Mapping
Visualize how data moves through your organization. Map data flows between systems, identifying where sensitive data is created, processed, stored, and transmitted. Data flow maps support privacy impact assessments and regulatory compliance.
Learn more Coming soonPrivacy Impact Assessments
Structured PIA workflow for new initiatives. When new systems or processes involve personal data, the PIA workflow guides teams through risk identification, mitigation planning, and DPO review before launch.
Learn more Coming soonRetention Policy Management
Define and enforce data retention schedules. Set retention periods by data classification level and regulatory requirement. Track compliance with retention policies and flag data that has exceeded its retention period for disposition.
Learn more Coming soon28. Security Awareness Training
Track employee security training completion, manage training campaigns, and demonstrate compliance with training requirements.
Training Campaign Management
Create and assign training campaigns to groups. Define training campaigns with target audiences, required courses, deadlines, and completion thresholds. Campaigns can target all employees, specific departments, or role-based groups.
Learn more Coming soonCompletion Tracking
Per-employee training status with dashboard metrics. Track which employees have completed required training, which are overdue, and overall organizational completion rates. Dashboard KPI cards show training compliance percentage.
Learn more Coming soonPhishing Simulation Tracking
Record and analyze phishing test results. Import results from phishing simulation platforms to track click rates, report rates, and improvement trends over time. Results link to individual employee training records.
Learn more Coming soonTraining Evidence for Auditors
Generate training compliance reports for audit. Export training completion data as evidence for compliance audits (HIPAA, PCI-DSS, SOC 2, ISO 27001). Reports show completion rates, overdue counts, and historical trends.
Learn more Coming soon29. Control Testing Automation
Schedule and execute periodic control effectiveness tests with evidence capture and gap identification.
Automated Test Scheduling
Recurring test plans on configurable schedules. Define test plans that execute on daily, weekly, monthly, or quarterly cadences. Each test plan specifies which controls to test, what evidence to collect, and who reviews the results.
Learn more Coming soonTest Procedures Library
Reusable test procedures for control effectiveness. Build a library of test procedures with step-by-step instructions, expected outcomes, and pass/fail criteria. Procedures can be assigned to controls and executed during test cycles.
Learn more Coming soonTest Result Tracking
Historical test results with trend analysis. Each test execution records pass/fail results, evidence collected, exceptions noted, and tester comments. Trend charts show control effectiveness over time across test cycles.
Learn more Coming soonGap Identification
Automatic gap detection from test failures. When control tests fail, the system automatically creates gap items linked to the failing control and test procedure, feeding into the remediation workflow for resolution tracking.
Learn more Coming soon30. Custom Control Frameworks
Build and manage organization-specific compliance frameworks with custom controls, domains, and scoring rules.
Framework Builder
Visual framework creation with drag-and-drop domains. The Framework Builder lets administrators define custom frameworks with named domains, control groupings, and mapping rules. Frameworks can inherit from existing standards or be built from scratch.
Learn more Coming soonCustom Control Definitions
Define controls with custom threshold logic. Create organization-specific controls with custom evaluation thresholds, audit guidance, remediation steps, and framework mappings. Custom controls integrate seamlessly with the existing V2 engine.
Learn more Coming soonFramework Import/Export
Share frameworks between organizations via JSON export. Custom frameworks can be exported as JSON packages and imported into other TATER organizations, enabling MSPs to distribute standardized frameworks across their client base.
Learn more Coming soonCross-Framework Mapping
Map custom controls to standard frameworks. Custom framework controls can be mapped to controls in standard frameworks (CIS, NIST, ISO), enabling organizations to demonstrate how their internal requirements align with industry standards.
Learn more Coming soon31. Groups & Feature Permissions
Tailor the TATER experience per organization and per user group. OrgAdmins and SuperAdmins can enable or disable individual features, create custom user groups, and assign fine-grained feature access through an interactive permission grid.
Custom Groups
Organize users into named groups with color-coded badges. Four default groups are provided (Administrators, Auditors, Viewers, All Users) and map automatically to TATER roles. OrgAdmins can create additional custom groups, assign members from the People directory, and give each group a distinctive color for at-a-glance identification throughout the platform.
Settings ReferenceFeature Registry
33 configurable features across 5 categories. Every navigable area of the platform — from Dashboard and Controls to Risk Register and the MSP Client Dashboard — is registered in a central feature registry. Each feature belongs to a category (Core, Compliance, Output, Security, or Manage) and can be toggled on or off at the organization level by an OrgAdmin. Core features (Dashboard, My Dashboard, Controls) cannot be disabled.
Permission Grid
Interactive matrix mapping features to groups. The permission grid displays every feature as a row and every group as a column, with checkboxes at each intersection. OrgAdmins can grant or revoke access to individual features per group, use the “All / None” toggles for bulk assignment, and save the entire matrix in one click. Core features are always checked and cannot be unchecked.
Preset Templates
5 built-in permission profiles for rapid setup. Presets include Full Access, Compliance Only, Security Focus, GRC Suite, and Basic. Selecting a preset auto-fills the permission grid checkboxes for the target group, providing a quick starting point that can then be fine-tuned. Presets are applied via a dropdown on the permission grid page.
Simplified Views
Automatically hide features users don’t need. When feature permissions are configured, the sidebar navigation dynamically adjusts for each user. Features outside a user’s group permissions are hidden, and empty navigation groups collapse automatically. This creates a clean, focused interface tailored to each user’s responsibilities. SuperAdmins always see all features regardless of group configuration.
TATER