Quick Start Guide

Get from zero to your first security scan in under 10 minutes. This guide walks you through account setup, tenant connection, and running your first compliance scan.

What You'll Need
Before starting, ensure you have:
  • A Microsoft 365 tenant with Global Administrator access
  • Permissions to consent to application permissions in Microsoft Entra ID
  • 10 minutes of time
1

Create Your TrueConfig Account

Navigate to the TrueConfig homepage and sign up for a new account. You can sign up with:

  • Magic link: Enter your email and we'll send you a secure sign-in link (no password needed)
  • SSO: Single sign-on with your identity provider (available on Pro and Scale plans)
7-Day Free Trial
All new accounts start with a 7-day free trial of the Pro plan. No credit card required. This gives you full access to auto-remediation, unlimited scans, and all baseline levels.

After Sign Up

You'll be prompted to create an organization - this is your workspace for managing tenants, team members, and security configurations. Just enter your company name and you're ready to connect your first tenant.

2

Connect Your Microsoft 365 Tenant

After creating your organization, you'll be guided through the tenant connection flow. This uses OAuth 2.0 with Microsoft to securely authorize TrueConfig to read your tenant configuration.

Connection Flow

1

Click "Connect Tenant"

From your organization dashboard, click the "Connect Tenant" button. You'll be redirected to Microsoft's login page.

2

Authenticate as Global Administrator

Sign in with a Global Administrator account for the tenant you want to monitor. This is required to consent to the necessary permissions.

3

Review and Accept Permissions

TrueConfig requests read-only permissions to view your users, groups, policies, and apps. Write permissions are optional and only needed if you want to use one-click fixes. You can always add write permissions later.

4

Confirm Tenant Details

After consent, you'll be redirected back to TrueConfig. Confirm your tenant name and domain, then click "Complete Connection."

Permission Scope
Start with read-only permissions if you're testing TrueConfig. You can always add write permissions later when you're ready to enable auto-remediation. Auto-remediation requires explicit opt-in and is disabled by default.

What Happens Behind the Scenes

When you connect a tenant, TrueConfig:

  • Stores an encrypted refresh token in the database (organization-scoped, RLS enforced)
  • Records your tenant metadata (tenant ID, primary domain, display name)
  • Creates audit log entries for the connection event
  • Does NOT store any user passwords or sensitive credentials
3

Select Your Security Baseline

Choose the security baseline level that matches your organization's risk appetite and operational capacity. You can change this later as your security maturity grows.

Level 1: Recommended Secure

Recommended for most organizations

13 Controls

Advisory mode with low operational risk. Establishes foundational security without lockout risks. Aligned with CIS Benchmarks and Microsoft Secure Defaults.

  • MFA enforcement for all users
  • Block legacy authentication
  • Limit Global Administrators (≤3)
  • App ownership and secret expiration

Level 2: Enhanced Security

For security-conscious organizations

25 Controls

Active enforcement with PIM requirements and phishing-resistant MFA for admins. Moderate operational impact with significantly improved security.

  • Everything in Level 1
  • PIM-only for privileged roles
  • Phishing-resistant MFA for admins
  • Device compliance requirements

Level 3: Maximum Security

For regulated industries

34 Controls

Strict enforcement with zero-tolerance for deviations. Designed for regulated industries, government, and high-value targets.

  • Everything in Level 2
  • Phishing-resistant MFA for all users
  • Hardware security keys for admins
  • Continuous access evaluation (CAE)
Start Conservative
We recommend starting with Level 1, especially if this is your first time implementing a security baseline. You can increase the level later after you've verified that controls don't impact your users or workflows.
4

Run Your First Security Scan

After selecting your baseline, TrueConfig will automatically trigger your first scan. You can also manually trigger scans at any time from the tenant dashboard.

What Happens During a Scan

1

Data Collection (15-30s)

TrueConfig queries Microsoft Graph API for users, groups, roles, role assignments, app registrations, service principals, and Conditional Access policies.

2

Data Normalization (5-10s)

Raw Graph API responses are normalized and stored in scan tables (tenant_users, tenant_roles, tenant_role_assignments, etc.).

3

Control Evaluation (10-20s)

TrueConfig checks your configuration against each security control in your baseline and records the results.

4

Audit Trail Recording

All evaluation results are persisted to the dsc_evaluations table, and immutable audit events are recorded in dsc_events for compliance tracking.

Scan Performance
A typical scan completes in 30-90 seconds depending on your tenant size. Large tenants (10,000+ users) may take up to 2 minutes. TrueConfig uses parallel API requests and intelligent caching to minimize scan time.
5

Review Scan Results and Take Action

After your scan completes, you'll see a dashboard showing your overall baseline alignment and individual control results.

Understanding Your Results

Security Score

Your security score shows what percentage of controls are passing. A score of 85% means most of your security settings are configured correctly - the dashboard will highlight which ones need attention.

Control Details

Click on any control to see detailed evaluation results, including evidence, affected resources, and remediation guidance.

Remediation Guidance

For failed controls, TrueConfig provides step-by-step remediation instructions:

  • What to fix: Clear description of the issue
  • Why it matters: Security impact and threat context
  • How to fix: Step-by-step instructions with Microsoft Portal links
  • Verification: How to confirm the fix was successful
Schedule Continuous Scans
After reviewing your first scan results, configure a scan schedule (daily, weekly, or custom interval) to enable continuous drift detection. TrueConfig will automatically alert you when your environment deviates from your baseline.

What's Next?