Getting Started
A step-by-step guide to connecting your tenant and getting the most out of the Veri-Tech platform.
A Global Administrator in your organization approves read-only access to your Microsoft 365 configuration. This is a standard Microsoft admin consent flow — no passwords or secrets are shared.
- ›Navigate to the onboarding page and click "Connect with Microsoft"
- ›Review the list of read-only permissions being requested
- ›A Global Administrator must approve the consent prompt
- ›Once approved, Veri-Tech can read your tenant configuration (policies, profiles, settings)
Veri-Guard scans your tenant against 548 M365 security controls across 12 compliance frameworks including CISA, CIS, NIST 800-53, NIST CSF, ISO 27001, SOC 2, HIPAA, and GDPR. Your first scan typically completes in under two minutes.
- ›Go to the Compliance Hub and click "Run Assessment"
- ›Select which workloads to include (Identity, Intune, SharePoint are default)
- ›Optionally enable Exchange and Teams scanning from Settings → Permissions
- ›View your compliance score and drill into individual control results
Your dashboard shows an overall compliance score and per-domain breakdowns. Each control shows pass/fail status, severity, and which frameworks it satisfies.
- ›Overall score is calculated from weighted pass/fail results across all assessed controls
- ›Domain scores show Identity, Intune, Exchange, Teams, SharePoint, and Defender separately
- ›Click any control to see its details, remediation guidance, and framework mappings
- ›Compare scores over time to track your compliance posture improvement
Generate standard operating procedures directly from your live M365 configuration. SOPs document your current policies — what is configured, how, and for which users.
- ›Go to the SOP Generator and select which policy types to include
- ›18 M365 policy types are supported (Conditional Access, Intune profiles, compliance policies, etc.)
- ›Export as Markdown, HTML, PDF, or DOCX with your company branding
- ›Runbooks are generated from compliance scan results and provide step-by-step remediation instructions
On the Enterprise plan, Veri-Guard can automatically deploy policy changes to close compliance gaps. All changes go through safety controls — Conditional Access policies deploy in report-only mode, and break-glass accounts are required.
- ›Review the gap analysis report to see which controls failed
- ›Select controls to remediate — each shows disruption risk and what will change
- ›Write permissions are granted just-in-time (JIT) and auto-revoked after the job completes
- ›Conditional Access policies are always deployed in report-only mode first
- ›Break-glass (emergency access) accounts are required before any write operations
Schedule recurring assessments to detect configuration drift. Compare scores across runs to identify when settings change unexpectedly.
- ›Set up scheduled scans (daily, weekly, or monthly) from Settings → Scan Schedule
- ›Configure compliance alerts to get notified when your score drops
- ›The Documents page archives every assessment, SOP, and runbook you generate
- ›Compare two assessment results side-by-side to see what changed
- ›Use the MSP Hub or Multi-Tenant Hub to manage multiple tenants from one dashboard
Veri-Tune extends your coverage to 375 Intune-specific controls across Windows, macOS, iOS, and Android — with Policy Insights, modify-in-place remediation, AI remediation plans, and a 3-tier dispatch workflow.
- ›Navigate to the Tune section and run an Intune baseline assessment
- ›Review assignment-aware dual scoring — deployed (effective) vs. configured (total) compliance
- ›Open Policy Insights to find setting overlaps, value conflicts, and unassigned overrides across every Intune policy — with downloadable detailed and executive reports
- ›Let the AI-generated remediation plan disposition each control (remediate / runbook / skip), then review and adjust
- ›Dispatch through the 3-tier change-advisory workflow (green / amber / red) — amber controls are pre-selected for review
- ›Modify-in-place remediation edits existing policies instead of stacking overrides; Windows + macOS device config and compliance policies are auto-remediated
- ›Use the dedicated /assign page with per-platform group selectors for configured-but-unassigned policies
- ›Included with Enterprise and MSP plans
Veri-Patch provides end-to-end Windows feature update management — from prerequisite validation through compatibility scanning, policy configuration, direct group assignment, and automated device group sync with zero-trust AU scoping.
- ›Run the prerequisite checker to validate telemetry, licensing, and enrollment
- ›View all WUfB update policies — feature rings, quality updates, expedited patches, and driver update profiles — each with assignment status badges
- ›Assign unassigned policies to security groups directly from the portal using live group search
- ›Run compatibility scans to classify devices as ready or blocked with detailed hold analysis
- ›Set up recurring scan schedules (daily, weekly, monthly) with email notifications
- ›Export device lists as CSV or sync to AU-scoped Entra security groups automatically
- ›Set up Administrative Unit scoping with the guided PowerShell wizard for zero-trust group access
Veri-Vault captures Automatic Scan Snapshots alongside every scan. Enterprise adds config restore, the Vault Activity Log, Tenant Reconnect Wizard, drift alerting, and Emergency Accounts for tenant recovery.
- ›Browse snapshots by date and run deep content search across snapshot contents
- ›Compare any two snapshots side-by-side with search/filter on the diff and CSV export
- ›Download All Runbooks from a snapshot as a single ZIP
- ›On Enterprise: review the Vault Activity Log for full audit history of snapshots, restores, and exports
- ›On Enterprise: configure drift alerts (email + HMAC-signed webhooks) for configuration changes outside approved windows
- ›On Enterprise: use config restore with JIT write permissions to roll the tenant back to a previous snapshot
- ›On Enterprise: set up Emergency Accounts with QR-code TOTP, scrypt password hashing, and AES-256-GCM Key Vault encryption for tenant recovery
- ›On Enterprise: use the Tenant Reconnect Wizard if consent expires, the app reg changes, or the tenant is migrated
Add teammates to the portal with role-based access control, an audit log of every action, and session revocation on demand. Seat limits apply per plan: 5 (Starter), 25 (Professional), unlimited (Enterprise and MSP).
- ›Go to Settings → Users → Invite and enter an email address
- ›Choose a role: Owner (full control + billing), Admin (full operational), Viewer (read-only), Billing (billing-only)
- ›Invites expire after 7 days; the invited user must sign in with the matching email to accept
- ›Enable "require invite" to block any new user who hasn't been pre-invited
- ›Use bulk role changes to update multiple users at once
- ›Revoke a session instantly if a device is compromised — propagation within 5 minutes
- ›Review the user audit log (Settings → Audit Log, Enterprise) for logins, role changes, invites, and removals
Need help? Submit a support ticket
