It’s already spring outside and I just got back from a nice walk in the sun (photo evidence below)! Today I’m writing from a small cafe in Hässleholm in southern Sweden. As always, traveling and seeing new places gives me inspiration to write. So here we go!
This blog post is a summary of important security logs and reports in Office 365 and Azure AD that I think every organization should check at least ones a week. For large organizations this can be a challenging task but fear not! Most of these logs and reports can be automatically fetched with PowerShell and Microsoft Graph, creating a nice opportunity for automation and integration with your existing SIEM (Security Information and Event Management) tools. For example, I recently helped a customer to integrate some of these logs with Splunk and I’ve previously helped another customer alerting on risky sign-ins with SolarWinds Orion. In both of these cases Microsoft Graph was used.
This is not a complete list of important logs and reports and there are plenty more in the Security and Compliance centers of Microsoft 365 to dig into. However, these are logs covering critical security areas and where a missed event can have a large impact on the organization. I’ve provided instructions on how to get to each log or report in the portals.
I might write a follow up in the future, explaining how to fetch this information with PowerShell and Microsoft Graph.
Here are the logs and reports I will cover in this post:
- Azure AD “Risky Sign-Ins” Report
- Application Usage Report
- Self-Service Password Reset Report
- User Role Group Changes
- Mail Forwarding Rules
- Mailbox Access by Non-Owners Report
- Malware Detection Report
- Spoofed Domains Report
- Restricted Users Report (Spam Senders)
Azure AD “Risky Sign-Ins” Report
- Go to portal.azure.com.
- Click Azure Active Directory.
- Select Risk events.
- Review by Detection Type.
Application Usage Report
- Go to portal.azure.com.
- Click Azure Active Directory.
- Select App Registrations.
- Filter on All apps.
- Review the information.
Self-Service Password Reset Report
- Go to portal.azure.com.
- Go to ‘Azure Active Directory’.
- Click on ‘Password Reset’.
- Select ‘Audit Logs’.
- Review the list of users who have reset their passwords in the last seven days.
User Role Group Changes
- Go to Security and Compliance Center.
- Select Search and Investigation and then Audit Log Search.
- Set Activities to Added member to role.
- Set Start Date and End Date.
- Click Search.
Mail Forwarding Rules
- Go to Security and Compliance Center.
- Select Mail Flow and then Dashboard.
- Review Auto Forwarded Messages on the dashboard.
Mailbox Access by Non-Owners Report
- Click Exchange.
- Click Compliance Management > Auditing.
- Select Run a non-owner mailbox access report.
- Enter Start Date and End Date.
- Change Search for access by field to all non-owners.
- Select Search.
Malware Detection Report
- Select Security and Compliance.
- Select Report and Dashboard.
- Review the Malware Detected in Email report.
Spoofed Domains Report
- Go to Security and Compliance Center.
- Select Reports and then Dashboard.
- Click Spoofed domains that failed authentication over the past 30 days.
- Review.
Restricted Users Report (Internal Spam Senders)
- Select Security and Compliance.
- Select Threat Management and Review.
- Click `Restricted Users’.
- Review alerts and take appropriate action (unblocking) after account has been re-mediated.
Please follow me here, on LinkedIn and on Twitter!
One thought on “Top Security Logs and Reports in Office 365 and Azure AD”