Connect Microsoft 365 Directory to Training Platform (2026)
Learn how to connect Microsoft 365 directory to training platform using Graph or SCIM, automate joiners/leavers, and scale multitenant MSPs. Get the 2026 guide.

DefendWise
DefendWise
TL;DR
Connecting a Microsoft 365 directory to a training platform means linking your Entra ID (formerly Azure Active Directory) user directory to a security awareness training system so user accounts sync automatically. This eliminates manual CSV uploads, ensures new hires get enrolled in training immediately, and removes departed employees without admin intervention. For MSPs managing dozens or hundreds of client tenants, this integration is the difference between a sustainable service and a time sink that eats your margins.
What Does It Mean to Connect a Microsoft 365 Directory to a Training Platform?
Every Microsoft 365 tenant includes a Microsoft Entra ID directory. This is the identity backbone of M365, the place where every user account, group membership, department tag, and job title lives. Microsoft’s own documentation confirms that M365 uses an Entra tenant to store and manage identities for authentication and permissions.
When you connect that Microsoft 365 directory to a training platform, you give the training system read access to this identity store. The platform pulls in user records (names, emails, departments, group memberships) and keeps them synchronized on an ongoing basis. No more exporting spreadsheets from the M365 admin center. No more manually adding new hires to your training roster on Monday morning.
The concept is simple: your M365 directory is the single source of truth for who works at an organization. Your training platform needs to know who those people are. Connecting the two makes the handoff automatic.
This matters more than it might sound. Research from Hornetsecurity found that roughly one in four organizations don’t provide security awareness training at all. Among those that do, coverage gaps are common. Employees slip through the cracks because someone forgot to add them to the training system. Directory sync closes that gap at the source.
A Quick Note on Naming: Azure AD vs. Microsoft Entra ID
If you’ve been in IT for more than a few years, you probably still say “Azure AD.” Microsoft rebranded Azure Active Directory to Microsoft Entra ID in 2023, but the old name persists in vendor documentation, community forums, and muscle memory. Both terms refer to the same cloud identity service.
Traditional on-premises Active Directory and cloud-based Entra ID are different products. If an organization runs hybrid identity (on-prem AD synced to the cloud via Entra Connect), the training platform typically syncs from Entra ID, the cloud side, not directly from the on-prem domain controller.
Throughout this article, “M365 directory” and “Entra ID directory” mean the same thing.
How the Connection Works: Integration Methods Explained
Not all directory connections are built the same way. Four methods exist in the market today, ranging from fully automated to entirely manual. Understanding the differences matters when evaluating a security awareness training platform for MSPs because the integration method determines how much ongoing work falls on your plate.
Microsoft Graph API
This is the modern standard. The training platform registers as an enterprise application in your Entra ID tenant, requests specific read permissions (like User.Read.All or Directory.Read.All), and pulls user data through Microsoft’s REST API on a regular schedule.
Huntress SAT, for example, uses Microsoft Graph to sync learners from the M365 directory. Most cloud-native training platforms built in the last few years use this approach. It requires no on-premises infrastructure, runs entirely in the cloud, and typically syncs every few hours.
SCIM Provisioning
SCIM (System for Cross-domain Identity Management) is an open standard that flips the data flow. Instead of the training platform pulling data from M365, Entra ID pushes user lifecycle events to the platform. When someone is created, updated, or deleted in Entra ID, SCIM notifies the training system automatically.
KnowBe4’s Microsoft integration supports SCIM-based provisioning, where Entra ID automatically provisions and de-provisions users and groups. This is powerful for lifecycle management, though it requires more configuration upfront.
One real-world friction point worth noting: KnowBe4’s own documentation acknowledges that migrating from their older ADI sync method to SCIM has limitations, such as alias email addresses not being supported in the SCIM integration. These kinds of edge cases are common when switching between sync methods.
Active Directory Integration (ADI)
This is the legacy approach. An on-premises agent installed on a server or VM reads from your local Active Directory and syncs user data to the cloud training platform. It was the standard before Graph API and SCIM matured, and some platforms still offer it.
The downsides are real: you need on-prem infrastructure, the agent requires maintenance and updates, and it adds another moving part to your environment. For MSPs managing client sites remotely, deploying and maintaining ADI agents across dozens of networks is impractical.
CSV Import
The fallback. Export a user list from the M365 admin center, open it in Excel, massage the columns to match the training platform’s import format, upload it. Repeat every time someone joins, leaves, or changes departments.
This works for a five-person company. It falls apart fast at scale.
Comparison Table
| Method | Data Direction | Automation Level | Best For | Maintenance Burden |
|---|---|---|---|---|
| Microsoft Graph API | Platform pulls from M365 | High (scheduled sync) | Cloud-native platforms, MSPs | Low |
| SCIM Provisioning | M365 pushes to platform | High (event-driven) | Organizations wanting real-time lifecycle sync | Medium (more setup) |
| ADI (On-prem agent) | Agent pushes from local AD | Medium (scheduled) | Legacy environments with no cloud path | High |
| CSV Import | Manual upload | None | Small orgs, one-time imports | Very high |
Why MSPs Need Microsoft 365 Directory Sync for Training
If you run an MSP and manage security awareness training for clients, the question isn’t whether you should connect Microsoft 365 directories to your training platform. It’s how quickly you can get it done.
Manual User Management Doesn’t Scale
Practitioners on Reddit’s r/msp community consistently report that manual user management across multiple SAT platforms is one of the biggest time sinks in their operations. The consensus: platforms without directory sync cost hours per month in user list maintenance, and that time compounds with every new client you onboard.
Think about the math. If you manage 50 client organizations, each with 20 to 200 users, and even 5% of those users change per month (new hires, departures, role changes), you’re looking at dozens of manual updates. Every month. Forever.
The Phin Security blog, which evaluates MSP-friendly SAT platforms, lists directory integrations as a must-have capability, alongside PSA tools like ConnectWise and Autotask. Their position is clear: “User syncing, compliance tracking, overdue reminders, and monthly training should not require MSP hands-on effort.”
Coverage Gaps Create Real Risk
A 2024 Fortinet report found that nearly 70% of organizations believe their employees lack critical cybersecurity knowledge, up from 56% the year before. Meanwhile, research compiled by Brightside AI shows that generic phishing emails fool 30% to 35% of untrained employees. That drops to 12% to 15% after basic training.
The gap between “untrained” and “trained” is enormous, and it maps directly to directory sync. Every new hire who sits in the M365 directory for weeks before someone remembers to add them to the training platform is an untrained user. Every departed employee still consuming a license seat is wasted budget. Automated onboarding through M365 sync eliminates both problems.
Compliance Frameworks Demand Proof of Coverage
Auditors don’t ask “do you do training?” They ask “can you prove every in-scope employee completed training?” Compliance frameworks like ISO 27001, NIST CSF, and Australia’s Essential Eight all require evidence that security awareness programs cover the full workforce.
When your training platform syncs directly with the M365 directory, you get that evidence automatically. The user roster in the training system matches the user roster in Entra ID. No gaps. No guesswork. No last-minute spreadsheet reconciliation before an audit.
For MSPs building compliance-ready reporting into their managed security offerings, this is table stakes.
Multi-Tenant Sync Is the Real Differentiator
Here’s what every vendor setup guide on the current search results misses: MSPs don’t sync one directory. They sync dozens, sometimes hundreds.
The CanIPhish MSP Buyers Guide makes the point well: a master and subordinate tenant architecture that synchronizes changes across all customer tenants quickly goes from a nice-to-have to an absolute necessity once your managed SAT service scales beyond a handful of customers.
Several MSP-focused threads on Reddit echo this. Smaller MSPs in particular report frustration with platforms that technically support M365 integration but require per-tenant configuration that takes 30 minutes each. Multiply that by 80 clients and you’ve burned a week just on setup, never mind ongoing maintenance.
The platforms that get this right let you connect a Microsoft 365 directory to the training platform from a single multi-tenant console, with each client tenant managed as a subclient under one roof.
What Data Gets Synced
When you connect a Microsoft 365 directory to a training platform, the sync typically includes:
User attributes: First name, last name, email address, department, job title, office location, manager. These fields power reporting segmentation and targeted training campaigns. You can see which departments have the lowest completion rates or highest phish-click rates without building any of that taxonomy manually.
Group memberships: Security groups and distribution groups from Entra ID map to training groups in the platform. This enables role-based training assignment. Finance teams get training on invoice fraud. Executives get spear-phishing scenarios. IT staff get modules on credential management. All driven by group membership that already exists in the directory.
Account status: Whether an account is enabled or disabled in Entra ID signals whether the user should be active in the training system. When someone leaves the organization and their account is disabled, the training platform can automatically remove or deactivate them.
Microsoft Entra ID also supports lifecycle workflows that manage users across joiner, mover, and leaver phases, with automated tasks triggered by attributes like hire date or department changes. A training platform syncing with this directory inherits those lifecycle signals. A new hire appearing in Entra ID gets auto-enrolled. A departing employee gets auto-removed.
Sync frequency varies by platform and method. Most Graph API integrations sync every 1 to 24 hours. SCIM can be near real-time for provisioning events. The right cadence depends on your tolerance for delay: a daily sync works for most organizations, but high-turnover environments might need something faster.
Common Confusion Points
“Directory Sync” vs. “User Provisioning”
These terms overlap but aren’t identical. Directory sync typically means the training platform reads from the M365 directory and imports user data. SCIM-based provisioning can go further, handling full lifecycle management including account creation and deletion on the training platform side.
For most security awareness training use cases, read-only sync is sufficient. The training platform doesn’t need to write back to Entra ID. It just needs to know who the users are.
Tenant-Level Admin Consent
When you connect a Microsoft 365 directory to a training platform, an admin in each M365 tenant must grant consent to the application’s API permissions. This is a security safeguard: Microsoft won’t let a third-party app read your directory data without explicit approval from a Global Administrator or similar role.
For MSPs, this means obtaining consent from each client tenant. Some platforms streamline this with a consent link that the MSP can walk through during onboarding. Others require the client admin to do it themselves. The fewer clicks this takes, the better.
Practitioners on r/msp frequently raise GDPR and data residency concerns here, especially MSPs with EU clients who want to know where synced directory data is stored and processed. Reviewing a platform’s data handling and privacy practices before connecting client directories is worth the time.
Hybrid Identity Environments
Organizations running on-premises Active Directory synced to Entra ID via Entra Connect have two directories in play. The training platform should sync from Entra ID (the cloud copy), not from the on-prem domain controller. This is cleaner, requires no on-prem agents, and works regardless of the client’s network topology.
What to Look For in a Training Platform’s M365 Integration
Not all directory integrations are equal. When evaluating platforms, these capabilities separate the practical from the painful:
Automatic joiner and leaver handling. The platform should auto-enroll new users appearing in the synced directory and auto-deactivate users whose accounts are disabled. If you have to manually trigger enrollment after sync, you’ve only solved half the problem.
Multi-tenant support. One platform console managing directory sync across many client M365 tenants. This is critical for MSPs. If the platform treats each client as a totally separate instance requiring separate logins and separate configuration, your admin overhead stays high.
Group-based filtering. Not every user in an M365 tenant needs training. Service accounts, shared mailboxes, and break-glass admin accounts should be excluded. The platform should let you sync only specific security groups or filter by attribute, rather than dumping the entire directory into the training roster.
Minimal permissions. The platform should request read-only directory access, not write permissions. Check the specific Microsoft Graph permissions it requires. User.Read.All and Group.Read.All are reasonable. Anything requesting write or admin consent beyond reading should raise questions.
Sync reliability and transparency. You should be able to see when the last sync ran, how many users were added or removed, and whether any errors occurred. Silent failures (where sync breaks and nobody notices for weeks) are a real problem with some platforms.
How DefendWise Handles M365 Directory Sync
DefendWise is a security awareness training platform built specifically for MSPs, and its Microsoft 365 directory sync reflects that focus.
The platform connects to client M365 directories and auto-enrolls new hires while removing departed employees, keeping training coverage continuous without manual user maintenance. Setup takes about 10 minutes per client tenant.
Where DefendWise stands apart for MSPs is its multi-tenant console with unlimited subclients. A single MSP can sync directories from every client M365 tenant in one place, manage campaigns, and pull compliance-ready reports mapped to Essential Eight, ISO 27001, and NIST CSF, all under the MSP’s own branding through full white-label support.
The pricing model matters here too. DefendWise charges a flat fee with unlimited users and unlimited client organizations. When directory sync adds new users from a growing client, your cost doesn’t change. There are no per-seat surprises as synced user counts grow, a model governed by a clear unlimited users fair use policy.
For MSPs tired of recalculating seat counts every time a client hires someone, this is a meaningful operational simplification.
Start a free 7-day trial to see how M365 directory sync works in practice, with no credit card required.
The Bigger Picture: Why This Integration Matters More Than It Used to
Microsoft 365 now has nearly 345 million paid subscribers and roughly 321 million active users worldwide, commanding about 30% of the global office-productivity market. For MSPs, M365 isn’t just common. It’s the default operating environment for the vast majority of clients.
At the same time, the threat environment is getting worse. Fortinet’s 2024 report found that more than 60% of organizations expect more employees to fall victim to attacks where cybercriminals use AI. Training that covers every employee, starting from day one, isn’t optional.
Connecting a Microsoft 365 directory to a training platform is the infrastructure that makes universal, timely coverage possible. It turns a manual chore into an automated system. It gives auditors clean evidence. And for MSPs operating at scale, it’s the difference between a profitable managed service and an admin burden that quietly erodes your team’s capacity.
The search results for this topic are full of vendor-specific setup guides. They tell you which buttons to click. But understanding what this connection actually does, why it matters, and what to look for in a platform’s implementation is the foundation that makes those setup steps meaningful.
Frequently Asked Questions
What permissions does a training platform need in Microsoft 365 to sync users?
Most platforms request read-only Microsoft Graph API permissions like User.Read.All and Group.Read.All. These let the platform read user profiles and group memberships without modifying anything in your directory. An admin with Global Administrator or Application Administrator rights must grant consent in each M365 tenant.
How often does directory sync run between M365 and the training platform?
It depends on the platform and integration method. Graph API-based syncs typically run every 1 to 24 hours. SCIM provisioning can be near real-time for user creation and deletion events. Daily syncs work for most organizations, but high-turnover environments may benefit from more frequent intervals.
Can I sync only specific groups instead of the entire M365 directory?
Yes, most platforms with mature M365 integration support group-based filtering. You select which security groups or organizational units to sync, which keeps service accounts, shared mailboxes, and out-of-scope users off the training roster.
What happens when an employee leaves and their M365 account is disabled?
With a properly configured directory sync, the training platform detects the disabled account status and automatically deactivates or removes that user. This prevents departed employees from consuming license seats and keeps your training reports accurate.
Is this the same as Single Sign-On (SSO)?
No. Directory sync imports user records into the training platform. SSO lets users log into the training platform using their M365 credentials without a separate password. They solve different problems and are often configured together but are independent capabilities.
How does an MSP manage directory sync across many client tenants?
Look for platforms with multi-tenant architecture, where one console manages sync connections to all client M365 tenants as separate subclients. Without this, you’re logging into separate instances for each client, which defeats the purpose of automation. The CanIPhish MSP Buyers Guide calls multi-tenant sync “an absolute necessity” at scale.
Does connecting an M365 directory expose sensitive data to the training platform?
The platform only accesses data covered by the permissions you grant. A read-only directory sync typically retrieves names, email addresses, departments, job titles, and group memberships. It does not access mailbox contents, files, or credentials. Review the platform’s privacy policy and data handling practices to understand where synced data is stored and processed.
What if my client uses on-premises Active Directory, not cloud-only M365?
If the client runs hybrid identity (on-prem AD synced to Entra ID via Entra Connect), the training platform syncs from the Entra ID cloud directory. The on-prem AD feeds into Entra ID, and the training platform reads from Entra ID. No direct connection to the on-prem domain controller is needed.