Category

Guides

Step-by-step tutorials and how-tos

14 min read

Microsoft Entra ID: The Complete Guide for IT Admins Who Manage Microsoft 365

Microsoft Entra ID is the identity backbone of every Microsoft 365 tenant. But most IT admins only scratch the surface. Here is what Entra ID actually does, how it fits into the broader Entra family, and which features you should be using today.

TrueConfig TeamFeb 16, 2026
9 min read

Microsoft Is Auto-Enabling Passkeys in Your Tenant Next Month. Are You Ready?

Starting March 2026, Microsoft will automatically enable passkey profiles in every Entra ID tenant. If you do nothing, your authentication configuration changes without your input. Here is what is happening, what could break, and exactly how to prepare.

TrueConfig TeamFeb 7, 2026
11 min read

Office 365 Security Checklist: 2026 Complete Guide

A comprehensive Office 365 security checklist covering identity management, access review processes, Conditional Access, data protection, and audit monitoring. Essential for IT teams managing Microsoft 365 at mid-sized companies.

TrueConfig TeamFeb 1, 2026
14 min read

CIS Benchmark for Microsoft 365: A Practical Implementation Guide

The CIS Microsoft 365 Benchmark contains 150+ security recommendations. Here is how to prioritize them, implement the ones that matter, and avoid the common mistakes that derail CIS compliance projects.

Nikolai PoverudJan 25, 2026
10 min read

Privileged Identity Management Setup: A Practical Guide for Mid-Sized Companies

Your Global Admin account has full access to everything in your Microsoft 365 environment, 24/7. Learn how to implement Privileged Identity Management (PIM) to reduce risk with just-in-time access—no dedicated security team required.

Nikolai PoverudJan 23, 2026
9 min read

Microsoft Entra Conditional Access: The 4-Tier Policy Framework That Works

Most Conditional Access deployments fail because of policy conflicts, admin lockouts, or gaps that leave attack vectors open. This framework organizes policies into four tiers that are secure, maintainable, and won not break your users.

Nikolai PoverudJan 5, 2025