Documentation/Operate/Notifications

Notifications

Stay informed about security deviations, scan completions, and drift events. Configure notifications via email, Microsoft Teams, or Slack.

Available on All Plans
Notifications are available to all TrueConfig users. Configure email notifications, Microsoft Teams, or Slack webhooks to stay informed about security events.

Notification Overview

TrueConfig can notify you when security events occur in your connected tenants. Notifications help you respond quickly to security deviations without constantly checking the dashboard.

Events That Trigger Notifications

  • Control failures (severity-filtered)
  • Configuration drift detected
  • Remediation actions (success/failure)
  • Scan completion summaries
  • Credential expiration warnings

Notification Channels

  • Email (to organization admins)
  • Microsoft Teams (via webhook)
  • Slack (via webhook)

Email Notifications

Email notifications are sent to organization administrators when security events occur. Each admin can control their individual email preferences.

How to Configure

  1. Navigate to Settings in the main menu
  2. Select the Notifications tab
  3. Toggle Email Notifications on
  4. Choose which event types to receive emails for
  5. Set your severity threshold (e.g., only critical and high)
  6. Click Save
Verify Email Address
Email notifications are sent to your account email address. Make sure your email is verified in your profile settings to receive notifications.

Microsoft Teams Integration

Send security alerts to a Microsoft Teams channel using an incoming webhook. This is ideal for security operations teams who monitor a shared channel.

Step 1: Create Teams Webhook

  1. Open Microsoft Teams and navigate to your security alerts channel
  2. Click the ... menu next to the channel name
  3. Select Manage channel
  4. Go to Connectors (or SettingsConnectors)
  5. Find Incoming Webhook and click Configure
  6. Give it a name like "TrueConfig Alerts"
  7. Click Create and copy the webhook URL

Step 2: Add Webhook to TrueConfig

  1. In TrueConfig, go to SettingsNotifications
  2. Find the Microsoft Teams section
  3. Paste your webhook URL
  4. Click Test Connection to verify it works
  5. Configure which events to send to Teams
  6. Click Save

Example Teams Message

TrueConfig Security Alert

Tenant: Contoso Corp (contoso.onmicrosoft.com)

Control: PA-01: Excessive Privileged Accounts

Status: FAIL

Details: 5 permanent Global Administrators detected (max: 3)

Slack Integration

Send security alerts to a Slack channel using an incoming webhook. Perfect for teams already using Slack for operations.

Step 1: Create Slack Webhook

  1. Go to api.slack.com/apps
  2. Click Create New AppFrom scratch
  3. Name it "TrueConfig" and select your workspace
  4. Go to Incoming Webhooks in the sidebar
  5. Toggle Activate Incoming Webhooks on
  6. Click Add New Webhook to Workspace
  7. Select the channel for alerts and click Allow
  8. Copy the webhook URL

Step 2: Add Webhook to TrueConfig

  1. In TrueConfig, go to SettingsNotifications
  2. Find the Slack section
  3. Paste your webhook URL
  4. Click Test Connection to verify it works
  5. Configure which events to send to Slack
  6. Click Save

Daily Digest

Instead of receiving individual alerts for each event, you can opt for a daily digest that summarizes all security events from the past 24 hours.

What's Included

  • Summary of control pass/fail counts
  • New drift events detected
  • Remediation actions taken
  • Overall posture score change
  • Upcoming credential expirations

How to Enable

  1. Go to SettingsNotifications
  2. Enable Daily Digest
  3. Choose delivery time (default: 8:00 AM local)
  4. Select channels (email, Teams, Slack)
Digest vs Real-Time
You can enable both daily digest and real-time alerts. Use real-time for critical/high severity events and digest for medium/low severity events to reduce alert fatigue.

Severity Filtering

Control notification volume by filtering based on severity. By default, only critical and high severity events trigger immediate notifications.

SeverityDefault BehaviorExample Events
CriticalReal-time notificationMFA disabled for admin, Global Admin added
HighReal-time notificationExcessive admins, legacy auth enabled
MediumDaily digest onlyApp missing owner, stale accounts
LowDaily digest onlyApproaching thresholds, info items

Customizing Severity Filters

You can adjust these defaults per notification channel:

  • Email: Critical and High (default)
  • Teams: All severities (for SOC channels)
  • Slack: Critical only (for executive visibility)
Notification settings panel showing email notification options including weekly reports, critical alerts, daily digest, deviation alerts, remediation alerts, and scan completion notifications

Next Steps