Security Controls Reference
54 security controls for Microsoft 365 and Entra ID. Browse by category, severity, or baseline level to find the controls you need.
Browse by Category
Identity & Authentication
5 controlsUser authentication and identity protection controls
Privileged Access
8 controlsAdministrative role and privilege management
Conditional Access
12 controlsAccess policies and conditional requirements
Workload Identity & Applications
8 controlsApplication registrations and service principals
Guest & External Access
7 controlsGuest users and external collaboration
Governance & Hygiene
6 controlsAccount lifecycle and hygiene practices
Logging & Visibility
5 controlsAudit logs and monitoring capabilities
Data Protection
2 controlsData loss prevention and information protection
License Management
1 controlsLicense utilization and cost optimization
All Controls
User MFA Registration
Identity & Authentication
Block Legacy Authentication
Identity & Authentication
Enable Self-Service Password Reset
Identity & Authentication
Limit Global Administrators to 2-4
Privileged Access
Use Dedicated Admin Accounts
Privileged Access
Configure Emergency Access Accounts
Privileged Access
Require MFA via Conditional Access Policy
Conditional Access
Require MFA for All Administrators
Conditional Access
Block Access from High-Risk Countries
Conditional Access
Assign Owners to All Applications
Workload Identity & Applications
Enforce Application Credential Expiration
Workload Identity & Applications
Restrict Guest Invitation Permissions
Guest & External Access
Require MFA for Guest Users
Guest & External Access
Review Stale User Accounts
Governance & Hygiene
Maintain Group Naming Conventions
Governance & Hygiene
Enable Unified Audit Logging
Logging & Visibility
Configure Privileged Operation Alerts
Logging & Visibility
Service Principal Credential Hygiene
Workload Identity & Applications
Restrict User Application Consent
Workload Identity & Applications
Enforce Session Lifetime Limits
Conditional Access
External Sharing Visibility
Guest & External Access
Detect External Mail Forwarding
Guest & External Access
Audit Privileged Role Assignments
Governance & Hygiene
Configure Smart Lockout Protection
Identity & Authentication
License Utilization Visibility
License Management
Eliminate Permanent Global Administrators
Privileged Access
Require PIM for All Privileged Roles
Privileged Access
Require Phishing-Resistant MFA for Admins
Privileged Access
Require Compliant Devices for Admin Access
Conditional Access
Block or Require MFA for Risky Sign-Ins
Conditional Access
Remediate High-Risk Users Automatically
Conditional Access
Internal App Registration Permissions
Workload Identity & Applications
Enable Admin Consent Workflow
Workload Identity & Applications
Automatically Disable Stale Accounts
Governance & Hygiene
Conduct Quarterly Privileged Access Reviews
Governance & Hygiene
Export Logs to Long-Term Storage
Logging & Visibility
Admin Activity Anomaly Detection
Logging & Visibility
Third-Party Enterprise App Permissions
Workload Identity & Applications
Identify Unused Service Principals
Workload Identity & Applications
Enable Token Protection
Conditional Access
Require Compliant Devices for Global Admins
Conditional Access
Configure Guest Access Expiration
Guest & External Access
Audit Mailbox Delegation
Guest & External Access
Enable Sensitive Data Classification
Data Protection
Require Phishing-Resistant MFA for All Users
Identity & Authentication
Require FIDO2 Security Keys for Administrators
Privileged Access
Enable Continuous Access Evaluation
Privileged Access
Require App Protection for Mobile Access
Conditional Access
Zero Trust Network Access
Conditional Access
Restrict Admin Access to Privileged Access Workstations
Conditional Access
Restrict Guest Access to Allowlisted Domains
Guest & External Access
Automate Threat Response with SOAR
Governance & Hygiene
Stream All Security Events to SIEM in Real-Time
Logging & Visibility
Block Bulk Data Exfiltration
Data Protection
Ready to secure your Microsoft 365 tenant?
TrueConfig continuously monitors your tenant against all 54 security controls and helps you fix deviations automatically.