Frequently Asked Questions
Find answers to common questions about TrueConfig, Microsoft 365 security configuration, and identity protection best practices.
General Questions
QWhat is TrueConfig?▼
TrueConfig is a Desired State Configuration (DSC) platform for Microsoft 365 identity and access security. It continuously monitors your Entra ID tenant, detects configuration drift from security baselines, and provides automated or guided remediation.
QHow does TrueConfig work with Microsoft 365?▼
TrueConfig connects to your Microsoft 365 tenant using read-only Graph API permissions. It scans your Entra ID configuration, evaluates it against industry-standard security baselines (CIS, NIST, etc.), and reports any deviations along with remediation guidance.
QIs TrueConfig safe to use on my production tenant?▼
Yes. TrueConfig uses read-only permissions by default. Auto-remediation is opt-in, requires explicit approval, and includes safety gates to prevent destructive changes. All actions are logged in a full audit trail.
QWhat security controls does TrueConfig monitor?▼
TrueConfig monitors 55 security controls across 9 categories including privileged access, identity protection, conditional access, MFA, application security, and more.
QDoes TrueConfig support multiple tenants?▼
Yes. TrueConfig supports multi-tenant deployments, allowing you to monitor and manage security across multiple Microsoft 365 tenants from a single dashboard. This is ideal for MSPs and enterprises with multiple environments.
FAQs by Security Category
Browse frequently asked questions organized by security control category.
Identity & Authentication
5User authentication and identity protection controls
Privileged Access
8Administrative role and privilege management
Conditional Access
12Access policies and conditional requirements
Workload Identity & Applications
9Application registrations and service principals
Guest & External Access
7Guest users and external collaboration
Governance & Hygiene
6Account lifecycle and hygiene practices
Logging & Visibility
5Audit logs and monitoring capabilities
Data Protection
2Data loss prevention and information protection
License Management
1License utilization and cost optimization
FAQs by Security Control
Get detailed answers about specific security controls and their implementation.
Related Resources
Still Have Questions?
Start a free trial and get personalized guidance for your Microsoft 365 security configuration from our security experts.
Start Free Trial