LemonBits

  • Home
  • About
  • Contact me
Microsoft 365, Office 365

Microsoft 365 Configuration Drift: How to Detect and Prevent Tenant Misconfigurations with UTCM

Frane Borozan - March 13, 2026

Microsoft 365 environments are constantly evolving. Administrators regularly update policies, adjust security settings, and deploy new services across workloads like Microsoft Entra ID, Exchange Online, Microsoft Teams, and Intune.

While these changes are necessary for managing modern cloud environments, they also introduce a common operational problem: Microsoft 365 configuration drift.

Configuration drift happens when the current state of a tenant gradually deviates from the intended configuration baseline. Over time, small changes accumulate, creating inconsistencies that can impact security, compliance, and operational stability.

To address this challenge, Microsoft introduced Unified Tenant Configuration Management (UTCM) — a new set of Microsoft Graph APIs designed to monitor Microsoft 365 configurations and automatically detect drift.

In this article, we’ll explore what Microsoft 365 configuration drift is, why it creates security risks, and how UTCM helps administrators detect configuration changes across their tenant.

Official documentation is available here https://learn.microsoft.com/en-us/graph/unified-tenant-configuration-management-concept-overview


What Is Microsoft 365 Configuration Drift?

Microsoft 365 configuration drift occurs when tenant settings gradually change over time and no longer match the intended security or governance baseline. This can happen when administrators modify policies, automation scripts update configurations, or services introduce new default settings.

Monitoring configuration drift helps organizations maintain consistent security, compliance, and operational standards across Microsoft 365 workloads.


Why Microsoft 365 Configuration Drift Is a Security Risk

Configuration drift is not just an operational inconvenience. It can introduce serious security and compliance risks.

Security gaps

Small configuration changes can weaken the security posture of the tenant. Examples include disabling MFA enforcement, modifying Conditional Access policies, or changing Microsoft Defender protection settings.

Compliance violations

Organizations operating under frameworks such as ISO 27001, SOC 2, or NIST must maintain consistent security configurations. Configuration drift can cause tenant settings to deviate from required compliance baselines.

Operational inconsistency

When multiple administrators change configurations across different services, the tenant environment can become inconsistent, making troubleshooting and governance more difficult.


How to Detect Microsoft 365 Configuration Drift

You can detect Microsoft 365 configuration drift by following these steps:

  1. Define a tenant configuration baseline

  2. Capture configuration snapshots

  3. Monitor configuration changes with automation

  4. Compare current settings with expected configurations

  5. Investigate drift alerts and policy modifications

Tools such as Unified Tenant Configuration Management (UTCM) help automate this process using Microsoft Graph APIs.


What Is Unified Tenant Configuration Management (UTCM)?

Unified Tenant Configuration Management (UTCM) is a Microsoft Graph capability designed to monitor configuration changes across Microsoft 365 services.

UTCM allows administrators to:

  • Capture configuration snapshots

  • Define configuration baselines

  • Monitor tenant settings

  • Detect configuration drift automatically

The goal of UTCM is to provide a centralized and automated approach to monitoring tenant configurations across Microsoft 365 workloads.


How UTCM Detects Microsoft 365 Configuration Drift

UTCM works by comparing the current configuration of tenant resources against a predefined baseline.

The system relies on three main components.

Configuration snapshots

A snapshot represents the current configuration state of a tenant at a specific point in time. Administrators can capture snapshots to document tenant settings across services such as Entra ID, Teams, Exchange, Intune, and Defender.

Configuration baselines

A baseline defines the expected configuration of the tenant. This baseline acts as the source of truth for configuration monitoring.

Configuration monitors

Configuration monitors run scheduled checks that compare the current tenant configuration with the defined baseline. If differences are detected, UTCM generates configuration drift records.


Microsoft 365 Services Supported by UTCM

UTCM currently supports configuration monitoring across several Microsoft 365 services.

These include:

  • Microsoft Entra ID

  • Exchange Online

  • Microsoft Teams

  • Microsoft Intune

  • Microsoft Defender

  • Microsoft Purview

Microsoft is expected to expand support for additional services as the feature evolves.


Common Examples of Microsoft 365 Configuration Drift

Service Example Configuration Drift
Microsoft Entra ID Conditional Access policy modified
Exchange Online Transport rule removed
Microsoft Teams External access enabled
Microsoft Intune Security baseline changed
Microsoft Defender Threat protection settings disabled

Why Microsoft 365 Configuration Drift Happens

Configuration drift typically occurs because of:

  • Multiple administrators changing settings

  • Lack of centralized configuration monitoring

  • Automated scripts modifying policies

  • New Microsoft 365 features introducing default settings

  • Manual configuration through different admin portals

Without monitoring tools, these changes accumulate and lead to inconsistent tenant configurations.


How to Start Monitoring Microsoft 365 Configuration Drift

To start using UTCM, administrators must first register the service principal and assign the required permissions.

Example PowerShell command:

New-MgServicePrincipal -AppId 03b07b79-c5bc-4b5e-9bfa-13acf4a99998

After setup, administrators can create configuration monitors that track tenant settings and identify configuration drift automatically.


Best Practices to Prevent Configuration Drift

Organizations can reduce Microsoft 365 configuration drift by implementing governance best practices:

  • Define a configuration baseline that documents expected security settings.
  • Limit administrative privileges using role-based access control.
  • Implement change management processes for configuration updates.
  • Use automated monitoring tools such as UTCM to detect unexpected changes.
 0 0
Share Now

Frane Borozan

Helping SBC administrators kick-ass Google+

Leave a Reply Cancel Reply

Your email address will not be published. Required fields are marked *

Previous Post Full Visibility Into Every Copilot Agent in Your Tenant

Connect with me on

Latest Posts

  • Creating a secure Microsoft Teams and Shared Channels environment for guest users

    Microsoft 365 Configuration Drift: How to Detect and Prevent Tenant Misconfigurations with UTCM

  • Full Visibility Into Every Copilot Agent in Your Tenant

  • Extended senstibitiy labels to the files that are downloaded from SharePoint

  • Subscribing to M365 Insider preview manually

  • Your guide to a SharePoint Online Site

    SharePoint alerts retirement

  • Introducing Teams Client Health: Proactive Monitoring for Microsoft Teams

  • Tracking and monitoring user access in Microsoft Teams and Shared channels

    Restricted content discovery or how Copilot can see that site too?

  • SharePoint Agents: Revolutionizing Workplace Collaboration

  • Microsoft Data Security Posture Management for AI

  • SharePoint agents are very use to create and use

Recent Comments

  • Nigel Sampath on Installing Remote Desktop Services 2016
  • Christoph Juli on VPN doesn’t work aka how to clear ARP cache on the computer when you connect to the VPN
  • Amir on The curious case of saved-critical Hyper-V machines in Hyper-V Manager or Incomplete VM Configuration in Virtual Machine Manager
  • Frane Borozan on Downloads folder slow to load/sort in Windows 10
  • güvenlik kamerası on Downloads folder slow to load/sort in Windows 10
  • Laki Lakovic on Opening group policy editor on a remote computer and forcing GP Update
  • Diane on Opening group policy editor on a remote computer and forcing GP Update
  • Manoj B on Differences between L1, L2, L3 system administrator guidlines
  • Travis Vroman on Teams slow
  • Yossi B on Remote Desktop Services Manager 2016
  • astha on SharePoint audit logs
  • Frane Borozan on Installing Remote Desktop Services 2016
  • Joe Zhou on Installing Remote Desktop Services 2016
  • Pino on Installing standalone Remote Desktop Gateway on the Windows Server 2012 R2 without complete Remote Desktop Services infrastructure
  • Eddy Wilson on Windows 10: Share a VPN Connection
  • haleybri.com on Remote Desktop Services Manager 2016
  • Atif on Remote Desktop Services Manager 2016
  • Tan Vu on KB2919355 The update is not applicable to your computer
  • Vinay on Installing Remote Desktop Services 2016
  • JOEL FERDY FEUBI TABOUE on KB2919355 The update is not applicable to your computer
  • Delmar on Installing standalone Remote Desktop Gateway on the Windows Server 2012 R2 without complete Remote Desktop Services infrastructure
  • Luke Welden on KB2919355 The update is not applicable to your computer
  • LM on Installing standalone Remote Desktop Gateway on the Windows Server 2012 R2 without complete Remote Desktop Services infrastructure
  • Anonymous987 on KB2919355 The update is not applicable to your computer
  • ANonyommus987 on KB2919355 The update is not applicable to your computer
  • Alan on Remote Desktop Services Manager 2016
  • Jagz on Installing Remote Desktop Services 2016
  • VG on SharePoint audit logs
  • VG on SharePoint audit logs
  • Kalle on SharePoint audit logs
  • 3 pandas on SQL Server security best practices
  • Kalle on SharePoint audit logs
  • Frane Borozan on Installing standalone Remote Desktop Gateway on the Windows Server 2012 R2 without complete Remote Desktop Services infrastructure
  • Erin Platt on Installing standalone Remote Desktop Gateway on the Windows Server 2012 R2 without complete Remote Desktop Services infrastructure
  • Tad Benoit on Remote Desktop Services Manager 2016

Copyright © 2023 Frane Borozan. All rights reserved