-
Notifications
You must be signed in to change notification settings - Fork 230
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Prototype M365 Auditing Changes and Enhancements #1072
Comments
Need to further refine. May split into multiple epics. |
Script to test timing of querying user mailbox audit settings for all users who have the default audit settings.
|
Script to generate temporary user mailboxes to use in performance testing per user audit checks against tenants with a given number of mailboxes.
|
New policy proposalImplement a new policy to check for users that have their mailbox audit logging set to bypass. According to Microsoft, "you can't disable mailbox auditing for specific mailboxes when mailbox auditing on by default is turned on in your organization. However, you can still use the Set-MailboxAuditBypassAssociation cmdlet in Exchange Online PowerShell to prevent all mailbox actions by the specified users from being logged." This has been logged as a separate issue so we don't need to adjudicate it here but we can certainly examine it if we want to during any current hands-on prototyping. |
Might want to consider this policy as well. Disable PowerShell access to inboxes from non-administrative users. Documentation This has been logged as a separate issue so we don't need to adjudicate it here. |
AuditEnabled implications for queries*My conclusion here needs to be verified. After reading the mailbox audit bypass article it says "you can't disable mailbox auditing for specific mailboxes when mailbox auditing on by default is turned on in your organization. For example, setting the AuditEnabled mailbox property to False is ignored." If I understand this correctly, this has implications for queries such as the one in the previous comment that use the AuditEnabled in a filter as shown below: It seems like the article says that if you detect that mailbox audit logging is turned on for the organization, then it wouldn't make sense to execute a query that filters on AuditEnabled because the article says that the property is AuditEnabled ignored in that case. Here is how to check if mailbox audit logging is on for the organization (a value of false means that it is turned on):
|
💡 Summary
The M365 unified audit log capability tracks actions taken across many of the M365 services. The log types supported depend on services in use, tenant licensing, and licenses applied to individual users. This epic is built around using identified changes to test audit policies from previous work to evaluate feasibility of implementing checks for updated baseline auditing policies.
Motivation and context
Auditing is a critical component for monitoring SaaS usage patterns, potential misuse, and detecting threats. Based on the expanded availability of several log types previously only available to Purview Premium and the publication of the Microsoft Expanded Cloud Logs Implementation Playbook, SCuBA baselines should be reviewed and updated to keep pace with these service updates and latest guidance.
Implementation notes
Prototyping auditing policy and assessment check enhancements will include:
Work Issues
Acceptance criteria
The following issues are completed
The text was updated successfully, but these errors were encountered: