Office 365 Ops

  



-->

Our mission is to empower everyone to achieve more and we build our products and services with security, privacy, compliance, and transparency in mind. Microsoft 365 brings users the full power of Microsoft Office, including Word, Outlook, PowerPoint, and Excel. It also enhances Microsoft Edge, Teams, and Family Safety across Windows 10, Xbox. Every Office 365 subscription comes with security capabilities. The goals and actions that you can take depend on the focus of these different subscriptions. In Office 365 security, there are three main security services (or products) tied to your subscription type: Exchange Online Protection (EOP).

Important

Solution update

This solution has been replaced by the Office 365 General Availability solution in Azure Sentinel and the Azure AD reporting and monitoring solution. Together they provide an updated version of the previous Azure Monitor Office 365 solution with an improved configuration experience. You can continue to use the existing solution until October 31, 2020.

Azure Sentinel is a cloud native Security Information and Event Management solution that ingests logs and provides additional SIEM functionality including detections, investigations, hunting and machine learning driven insights. Using Azure Sentinel will now provide you with ingestion of Office 365 SharePoint activity and Exchange management logs.

Azure AD reporting provides a more comprehensive view of logs from Azure AD activity in your environment, including sign in events, audit events, and changes to your directory. To connect Azure AD logs, you can use either the Azure Sentinel Azure AD connector or configure Azure AD logs integration with Azure Monitor.

The collection of Azure AD log is subjected to Azure Monitor pricing. See Azure Monitor pricing for more information.

To use the Azure Sentinel Office 365 solution:

  1. Using Office 365 connector in Azure Sentinel affects the pricing for your workspace. For more information, see Azure Sentinel pricing.
  2. If you are already using the Azure Monitor Office 365 solution, you must first uninstall it using the script in the Uninstall section below.
  3. Enable the Azure Sentinel solution on your workspace.
  4. Go to the Data connectors page in Azure Sentinel and enable the Office 365 connector.

Frequently asked questions

Q: Is it possible to on-board the Office 365 Azure Monitor solution between now and October 31?

No, the Azure Monitor Office 365 solution onboarding scripts are no longer available. The solution will be removed on October 31.

Q: Will the tables and schemas be changed?

The OfficeActivity table name and schema will remain the same as in the current solution. You can continue using the same queries in the new solution excluding queries that reference Azure AD data.

The new Azure AD reporting and monitoring solution logs will be ingested into the SigninLogs and AuditLogs tables instead of OfficeActivity. For more information, see how to analyze Azure AD logs, which is also relevant for Azure Sentinel and Azure Monitor users.

Following are samples for converting queries from OfficeActivity to SigninLogs:

Office 365 opsigelse

Query failed sign-ins, by user:

View Azure AD operations:

Q: How can I on-board Azure Sentinel?

Azure Sentinel is a solution that you can enable on new or existing Log Analytics workspace. To learn more, see Azure Sentinel on-boarding documentation.

Q: Do I need Azure Sentinel to connect the Azure AD logs?

You can configure Azure AD logs integration with Azure Monitor, which is not related to the Azure Sentinel solution. Azure Sentinel provides a native connector and out-of-the box content for Azure AD logs. For more information, see the question below on out-of-the-box security-oriented content.

Q: What are the differences when connecting Azure AD logs from Azure Sentinel and Azure Monitor?

Azure Sentinel and Azure Monitor connect to Azure AD logs based on the same Azure AD reporting and monitoring solution. Azure Sentinel provides a one-click, native connector that connects the same data and provides monitoring information.

Q: What do I need to change when moving to the new Azure AD reporting and monitoring tables?

All queries using Azure AD data, including queries in alerts, dashboards, and any content that you created using Office 365 Azure AD data, must be recreated using the new tables.

Azure Sentinel and Azure AD provide built-in content that you can use when moving to the Azure AD reporting and monitoring solution. For more information, see the next question on out-of-the-box security-oriented content and How to use Azure Monitor workbooks for Azure Active Directory reports.

Q: How I can use the Azure Sentinel out-of-the-box security-oriented content?

Azure Sentinel provides out-of-the-box security-oriented dashboards, custom alert queries, hunting queries, investigation, and automated response capabilities based on the Office 365 and Azure AD logs. Explore the Azure Sentinel GitHub and tutorials to learn more:

Q: Does Azure Sentinel provide additional connectors as part of the solution?

Yes, see Azure Sentinel connect data sources.

Q: What will happen on October 31? Do I need to offboard beforehand?

  • You won't be able to receive data from the Office365 solution. The solution will be removed from your workspace and will no longer be available in the Marketplace.
  • For Azure Sentinel customers, the Log Analytics workspace solution Office365 will be included in the Azure Sentinel SecurityInsights solution.
  • If you don't offboard your solution manually by October 31, your data will be disconnected automatically, and the OfficeActivity table removed. Even so, you will still be able to restore the table when you enable the Office 365 connector in Azure Sentinel, as explained below.

Q: Will my data transfer to the new solution?

Yes. When you remove the Office 365 solution from your workspace, its data will become temporarily unavailable because the schema is removed. When you enable the new Office 365 connector in Azure Sentinel, the schema is restored to the workspace and any data already collected will become available.

The Office 365 management solution allows you to monitor your Office 365 environment in Azure Monitor.

  • Monitor user activities on your Office 365 accounts to analyze usage patterns as well as identify behavioral trends. For example, you can extract specific usage scenarios, such as files that are shared outside your organization or the most popular SharePoint sites.
  • Monitor administrator activities to track configuration changes or high privilege operations.
  • Detect and investigate unwanted user behavior, which can be customized for your organizational needs.
  • Demonstrate audit and compliance. For example, you can monitor file access operations on confidential files, which can help you with the audit and compliance process.
  • Perform operational troubleshooting by using log queries on top of Office 365 activity data of your organization.

Uninstall

You can remove the Office 365 management solution using the process in Remove a management solution. This will not stop data being collected from Office 365 into Azure Monitor though. Follow the procedure below to unsubscribe from Office 365 and stop collecting data.

  1. Save the following script as office365_unsubscribe.ps1.

  2. Run the script with the following command:

    Example:

You will be prompted for credentials. Provide the credentials for your Log Analytics workspace.

Data collection

It may take a few hours for data to initially be collected. Once it starts collecting, Office 365 sends a webhook notification with detailed data to Azure Monitor each time a record is created. This record is available in Azure Monitor within a few minutes after being received.

Using the solution

Data collected by this monitoring solution is available in the Azure Monitor Overview page in the Azure portal. Open this page from the Azure Monitor menu by clicking More under the Insights section. Each solution is represented by a tile. Click on a tile for more detailed data collected by that solution.

When you add the Office 365 solution to your Log Analytics workspace, the Office 365 tile will be added to your dashboard. This tile displays a count and graphical representation of the number of computers in your environment and their update compliance.

Click on the Office 365 tile to open the Office 365 dashboard.

The dashboard includes the columns in the following table. Each column lists the top ten alerts by count matching that column's criteria for the specified scope and time range. You can run a log search that provides the entire list by clicking See all at the bottom of the column or by clicking the column header.

ColumnDescription
OperationsProvides information about the active users from your all monitored Office 365 subscriptions. You will also be able to see the number of activities that happen over time.
ExchangeShows the breakdown of Exchange Server activities such as Add-Mailbox Permission, or Set-Mailbox.
SharePointShows the top activities that users perform on SharePoint documents. When you drill down from this tile, the search page shows the details of these activities, such as the target document and the location of this activity. For example, for a File Accessed event, you will be able to see the document that's being accessed, its associated account name, and IP address.
Azure Active DirectoryIncludes top user activities, such as Reset User Password and Login Attempts. When you drill down, you will be able to see the details of these activities like the Result Status. This is mostly helpful if you want to monitor suspicious activities on your Azure Active Directory.

Azure Monitor log records

All records created in the Log Analytics workspace in Azure Monitor by the Office 365 solution have a Type of OfficeActivity. The OfficeWorkload property determines which Office 365 service the record refers to - Exchange, AzureActiveDirectory, SharePoint, or OneDrive. The RecordType property specifies the type of operation. The properties will vary for each operation type and are shown in the tables below.

Common properties

The following properties are common to all Office 365 records.

PropertyDescription
TypeOfficeActivity
ClientIPThe IP address of the device that was used when the activity was logged. The IP address is displayed in either an IPv4 or IPv6 address format.
OfficeWorkloadOffice 365 service that the record refers to.
AzureActiveDirectory
Exchange
SharePoint
OperationThe name of the user or admin activity.
OrganizationIdThe GUID for your organization's Office 365 tenant. This value will always be the same for your organization, regardless of the Office 365 service in which it occurs.
RecordTypeType of operation performed.
ResultStatusIndicates whether the action (specified in the Operation property) was successful or not. Possible values are Succeeded, PartiallySucceeded, or Failed. For Exchange admin activity, the value is either True or False.
UserIdThe UPN (User Principal Name) of the user who performed the action that resulted in the record being logged; for example, my_name@my_domain_name. Note that records for activity performed by system accounts (such as SHAREPOINTsystem or NTAUTHORITYSYSTEM) are also included.
UserKeyAn alternative ID for the user identified in the UserId property. For example, this property is populated with the passport unique ID (PUID) for events performed by users in SharePoint, OneDrive for Business, and Exchange. This property may also specify the same value as the UserID property for events occurring in other services and events performed by system accounts
UserTypeThe type of user that performed the operation.
Admin
Application
DcAdmin
Regular
Reserved
ServicePrincipal
System

Azure Active Directory base

The following properties are common to all Azure Active Directory records.

PropertyDescription
OfficeWorkloadAzureActiveDirectory
RecordTypeAzureActiveDirectory
AzureActiveDirectory_EventTypeThe type of Azure AD event.
ExtendedPropertiesThe extended properties of the Azure AD event.

Azure Active Directory Account logon

These records are created when an Active Directory user attempts to log on.

PropertyDescription
OfficeWorkloadAzureActiveDirectory
RecordTypeAzureActiveDirectoryAccountLogon
ApplicationThe application that triggers the account login event, such as Office 15.
ClientDetails about the client device, device OS, and device browser that was used for the of the account login event.
LoginStatusThis property is from OrgIdLogon.LoginStatus directly. The mapping of various interesting logon failures could be done by alerting algorithms.
UserDomainThe Tenant Identity Information (TII).

Azure Active Directory

Office

These records are created when change or additions are made to Azure Active Directory objects.

PropertyDescription
OfficeWorkloadAzureActiveDirectory
RecordTypeAzureActiveDirectory
AADTargetThe user that the action (identified by the Operation property) was performed on.
ActorThe user or service principal that performed the action.
ActorContextIdThe GUID of the organization that the actor belongs to.
ActorIpAddressThe actor's IP address in IPV4 or IPV6 address format.
InterSystemsIdThe GUID that track the actions across components within the Office 365 service.
IntraSystemIdThe GUID that's generated by Azure Active Directory to track the action.
SupportTicketIdThe customer support ticket ID for the action in 'act-on-behalf-of' situations.
TargetContextIdThe GUID of the organization that the targeted user belongs to.

Data Center Security

These records are created from Data Center Security audit data.

PropertyDescription
EffectiveOrganizationThe name of the tenant that the elevation/cmdlet was targeted at.
ElevationApprovedTimeThe timestamp for when the elevation was approved.
ElevationApproverThe name of a Microsoft manager.
ElevationDurationThe duration for which the elevation was active.
ElevationRequestIdA unique identifier for the elevation request.
ElevationRoleThe role the elevation was requested for.
ElevationTimeThe start time of the elevation.
Start_TimeThe start time of the cmdlet execution.

Exchange Admin

These records are created when changes are made to Exchange configuration.

PropertyDescription
OfficeWorkloadExchange
RecordTypeExchangeAdmin
ExternalAccessSpecifies whether the cmdlet was run by a user in your organization, by Microsoft datacenter personnel or a datacenter service account, or by a delegated administrator. The value False indicates that the cmdlet was run by someone in your organization. The value True indicates that the cmdlet was run by datacenter personnel, a datacenter service account, or a delegated administrator.
ModifiedObjectResolvedNameThis is the user friendly name of the object that was modified by the cmdlet. This is logged only if the cmdlet modifies the object.
OrganizationNameThe name of the tenant.
OriginatingServerThe name of the server from which the cmdlet was executed.
ParametersThe name and value for all parameters that were used with the cmdlet that is identified in the Operations property.

Exchange Mailbox

These records are created when changes or additions are made to Exchange mailboxes.

PropertyDescription
OfficeWorkloadExchange
RecordTypeExchangeItem
ClientInfoStringInformation about the email client that was used to perform the operation, such as a browser version, Outlook version, and mobile device information.
Client_IPAddressThe IP address of the device that was used when the operation was logged. The IP address is displayed in either an IPv4 or IPv6 address format.
ClientMachineNameThe machine name that hosts the Outlook client.
ClientProcessNameThe email client that was used to access the mailbox.
ClientVersionThe version of the email client .
InternalLogonTypeReserved for internal use.
Logon_TypeIndicates the type of user who accessed the mailbox and performed the operation that was logged.
LogonUserDisplayNameThe user-friendly name of the user who performed the operation.
LogonUserSidThe SID of the user who performed the operation.
MailboxGuidThe Exchange GUID of the mailbox that was accessed.
MailboxOwnerMasterAccountSidMailbox owner account's master account SID.
MailboxOwnerSidThe SID of the mailbox owner.
MailboxOwnerUPNThe email address of the person who owns the mailbox that was accessed.

Exchange Mailbox Audit

These records are created when a mailbox audit entry is created.

PropertyDescription
OfficeWorkloadExchange
RecordTypeExchangeItem
ItemRepresents the item upon which the operation was performed
SendAsUserMailboxGuidThe Exchange GUID of the mailbox that was accessed to send email as.
SendAsUserSmtpSMTP address of the user who is being impersonated.
SendonBehalfOfUserMailboxGuidThe Exchange GUID of the mailbox that was accessed to send mail on behalf of.
SendOnBehalfOfUserSmtpSMTP address of the user on whose behalf the email is sent.

Exchange Mailbox Audit Group

These records are created when changes or additions are made to Exchange groups.

PropertyDescription
OfficeWorkloadExchange
OfficeWorkloadExchangeItemGroup
AffectedItemsInformation about each item in the group.
CrossMailboxOperationsIndicates if the operation involved more than one mailbox.
DestMailboxIdSet only if the CrossMailboxOperations parameter is True. Specifies the target mailbox GUID.
DestMailboxOwnerMasterAccountSidSet only if the CrossMailboxOperations parameter is True. Specifies the SID for the master account SID of the target mailbox owner.
DestMailboxOwnerSidSet only if the CrossMailboxOperations parameter is True. Specifies the SID of the target mailbox.
DestMailboxOwnerUPNSet only if the CrossMailboxOperations parameter is True. Specifies the UPN of the owner of the target mailbox.
DestFolderThe destination folder, for operations such as Move.
FolderThe folder where a group of items is located.
FoldersInformation about the source folders involved in an operation; for example, if folders are selected and then deleted.

SharePoint Base

These properties are common to all SharePoint records.

PropertyDescription
OfficeWorkloadSharePoint
OfficeWorkloadSharePoint
EventSourceIdentifies that an event occurred in SharePoint. Possible values are SharePoint or ObjectModel.
ItemTypeThe type of object that was accessed or modified. See the ItemType table for details on the types of objects.
MachineDomainInfoInformation about device sync operations. This information is reported only if it's present in the request.
MachineIdInformation about device sync operations. This information is reported only if it's present in the request.
Site_The GUID of the site where the file or folder accessed by the user is located.
Source_NameThe entity that triggered the audited operation. Possible values are SharePoint or ObjectModel.
UserAgentInformation about the user's client or browser. This information is provided by the client or browser.
Office 365 opslagruimte

SharePoint Schema

Office 365 Ops

These records are created when configuration changes are made to SharePoint.

PropertyDescription
OfficeWorkloadSharePoint
OfficeWorkloadSharePoint
CustomEventOptional string for custom events.
Event_DataOptional payload for custom events.
ModifiedPropertiesThe property is included for admin events, such as adding a user as a member of a site or a site collection admin group. The property includes the name of the property that was modified (for example, the Site Admin group), the new value of the modified property (such the user who was added as a site admin), and the previous value of the modified object.

SharePoint File Operations

Ops Org 365

These records are created in response to file operations in SharePoint.

PropertyDescription
OfficeWorkloadSharePoint
OfficeWorkloadSharePointFileOperation
DestinationFileExtensionThe file extension of a file that is copied or moved. This property is displayed only for FileCopied and FileMoved events.
DestinationFileNameThe name of the file that is copied or moved. This property is displayed only for FileCopied and FileMoved events.
DestinationRelativeUrlThe URL of the destination folder where a file is copied or moved. The combination of the values for SiteURL, DestinationRelativeURL, and DestinationFileName parameters is the same as the value for the ObjectID property, which is the full path name for the file that was copied. This property is displayed only for FileCopied and FileMoved events.
SharingTypeThe type of sharing permissions that were assigned to the user that the resource was shared with. This user is identified by the UserSharedWith parameter.
Site_UrlThe URL of the site where the file or folder accessed by the user is located.
SourceFileExtensionThe file extension of the file that was accessed by the user. This property is blank if the object that was accessed is a folder.
SourceFileNameThe name of the file or folder accessed by the user.
SourceRelativeUrlThe URL of the folder that contains the file accessed by the user. The combination of the values for the SiteURL, SourceRelativeURL, and SourceFileName parameters is the same as the value for the ObjectID property, which is the full path name for the file accessed by the user.
UserSharedWithThe user that a resource was shared with.

Sample log queries

The following table provides sample log queries for update records collected by this solution.

QueryDescription
Count of all the operations on your Office 365 subscriptionOfficeActivity | summarize count() by Operation
Usage of SharePoint sitesOfficeActivity | where OfficeWorkload =~ 'sharepoint' | summarize count() by SiteUrl | sort by Count asc
File access operations by user typeOfficeActivity | summarize count() by UserType
Monitor external actions on ExchangeOfficeActivity | where OfficeWorkload =~ 'exchange' and ExternalAccess true

Next steps

Ops School Calendar 2020 2021

  • Use log queries in Azure Monitor to view detailed update data.
  • Create your own dashboards to display your favorite Office 365 search queries.
  • Create alerts to be proactively notified of important Office 365 activities.