Ova

How to Configure Office 365 Audit Log

Published in Microsoft 365 Auditing 5 mins read

Configuring the Office 365 (Microsoft 365) audit log is essential for maintaining security, compliance, and operational insights into user and admin activities across your organization. It involves ensuring the feature is enabled, understanding its capabilities, and knowing how to manage and search the logs effectively.

Enabling the Audit Log

The first and most critical step in configuring your Office 365 audit log is to ensure that auditing is actively enabled within your tenant. Without this, no activity data will be collected.

  1. Access the Microsoft Purview Compliance Portal: Navigate to the Microsoft Purview compliance portal.
  2. Navigate to Audit Log Search: From the left-hand navigation panel, click on Search, then select Audit log search.
  3. Activate Auditing (If Needed): On the subsequent screen, if you see a prominent button labeled "Turn on auditing", click it to activate the auditing feature for your organization. If this button is not visible, it indicates that auditing is already enabled, and no further action is required for initial activation.

Once enabled, Microsoft 365 will begin recording a wide range of user and administrator activities across various services, including Exchange Online, SharePoint Online, OneDrive for Business, Teams, and more.

Understanding Audit Log Capabilities

The audit log captures a vast array of activities, providing a detailed trail of events within your Microsoft 365 environment. These activities include:

  • User Activities: File access, modification, deletion in SharePoint/OneDrive; email item access, deletion in Exchange Online; chat messages in Teams.
  • Admin Activities: Changes to tenant settings, security policies, user accounts, and group memberships.
  • System Events: Data governance actions, eDiscovery operations.

This data is crucial for:

  • Security Investigations: Identifying suspicious activities, data breaches, or unauthorized access.
  • Compliance Requirements: Demonstrating adherence to regulatory standards (e.g., GDPR, HIPAA, SOX) by providing a verifiable record of actions.
  • Troubleshooting: Pinpointing the cause of issues by reviewing recent changes or activities.

Managing Audit Log Retention

The duration for which audit logs are retained varies based on your Microsoft 365 subscription and any add-ons. Understanding these retention policies is key to long-term compliance and investigation capabilities.

Subscription/Feature Standard Audit Log Retention Advanced Audit Log Retention
Most Microsoft 365 Subscriptions 90 days N/A
Microsoft 365 E5 / A5 / G5 N/A 1 year (default for most)
Audit Add-on (for non-E5) N/A 1 year
Audit (Premium) Add-on N/A 10 years (configurable)
  • Standard Auditing: Included with most Microsoft 365 subscriptions, offering a 90-day retention period for audit records.
  • Advanced Auditing: Available with Microsoft 365 E5/A5/G5 subscriptions or as an add-on. This provides a longer default retention of one year for most audit records, with the option to extend retention to 10 years for specific high-value events through audit retention policies.

You can configure audit log retention policies in the Microsoft Purview compliance portal to customize how long certain audit records are kept beyond the default.

Searching the Audit Log

Once auditing is enabled and logs are being collected, the next step is to know how to effectively search them for specific information. The Audit log search tool in the Microsoft Purview compliance portal is your primary interface.

  1. Access the Audit Log Search: Go to the Microsoft Purview compliance portal > Search > Audit log search.
  2. Define Your Search Criteria:
    • Date and Time Range: Specify the start and end dates/times for your search.
    • Activities: Choose specific activities you want to search for (e.g., "File accessed," "Mailbox login," "User added"). You can select multiple activities or leave it blank to search for all activities.
    • Users: Enter the specific user(s) whose activities you want to audit.
    • Files, Folders, or Sites: Specify the name of an object or its URL if you're looking for activities related to specific content.
  3. Run the Search: Click Search to execute your query.
  4. Review and Export Results: The results will display in the compliance portal. You can further refine them, or export the results to a CSV file for more detailed analysis.

Practical Tip: For complex or recurring searches, consider saving your search queries in the compliance portal.

Advanced Audit Log Features (Microsoft 365 E5)

Organizations with Microsoft 365 E5 subscriptions benefit from enhanced auditing capabilities, often referred to as Advanced Auditing. These features include:

  • Longer Retention: Default 1-year retention for all audit logs, extendable to 10 years for specific events.
  • Higher-Value Events: Access to more granular and critical events, such as mailbox item properties accessed, and sensitive data access events.
  • Increased Bandwidth for Data Retrieval: Faster access to a larger volume of audit data.
  • Integration with Microsoft Graph API: Programmatic access to audit logs, enabling integration with SIEM (Security Information and Event Management) systems or custom reporting tools.

To fully leverage these advanced features, ensure your users are assigned the appropriate E5 licenses and configure audit retention policies as needed.

Permissions for Audit Log Management

To manage and search the audit log, users require specific permissions within Microsoft 365. Typically, these roles include:

  • Global Administrator: Has full access and can enable/disable auditing and search logs.
  • Compliance Administrator: Can search the audit log and manage audit retention policies.
  • Audit Log Mailbox Role: Can search the audit log for Exchange Online activities.
  • View-Only Audit Logs Role: Provides read-only access to audit log search.

It is recommended to follow the principle of least privilege when assigning these roles.

By properly configuring and regularly utilizing the Office 365 audit log, organizations can significantly enhance their security posture, meet compliance obligations, and gain critical insights into their digital environment.