SlideShare a Scribd company logo
1 of 19
Securing Office 365 with
Activity Monitoring
Thank you for joining our webinar!
We will begin shortly.
Introduction
โ€ข โ€˜30 on Thursdayโ€™ Series
โ€ข Bi-weekly 30 minute webinar series
โ€ข Next Webinar:
โ€ข October 22: โ€œBuilding Nintex Mobile Appsโ€
โ€ข Full Schedule: SharePoint.Protiviti.com/Webinars
Live Tweeting!
Tweet us your questions & feedback
during the webinar!
Tweet @ProtivitiSP and use
#30TOffice365
Todayโ€™s Session
โ€ข Todayโ€™s session is being recorded
โ€ข Archive of past sessions
โ€ข SharePoint.Protiviti.com/ArchivedWebinars
โ€ข Questions - Use the Question Window or tweet us your
questions @ProtivitiSP using #30TOffice365
Session Overview
โ€ข Topic:
โ€ข Securing Office 365 with Activity Monitoring
โ€ข Presenter:
โ€ข Antonio Maio, SharePoint MVP
โ€ข Moderator:
โ€ข Julia Marple, Protiviti
LETโ€™S GET STARTED!
Why Monitor and Audit Our Systems?
โ€ข Meet Regulatory Compliance Obligations
โ€ข Investigate Data Breaches
โ€ข Audit Access to Sensitive Content
Office 365 Activity Monitoring Capabilities
1. Office 365 Activity Report
2. Comprehensive Event Logging
3. Search Powershell Cmdlet
4. Management Activity API
1. Office 365 Activity Report
โ€ข Login to Office 365
โ€ข Navigate to Admin > Compliance Center > Reports > Office 365 Activity Report
1. Office 365 Activity Report
โ€ข Search across SharePoint Online,
OneDrive for Business, Exchange
Online, Azure AD
โ€ข Search by users, file, folder, site,
by date range
โ€ข Search by type of activity
โ€ข View Activity Details (Details Pane)
โ€ข Run Report on Demand
โ€ข Export results to CSV
1. Office 365 Activity Report
โ€ข With each event, up to 37 event properties are logged
โ€ข Actor
โ€ข ClientIP
โ€ข ClientProcessName
โ€ข CreationTime
โ€ข DestinationFileExtension
โ€ข DestinationFileName
โ€ข DestinationRelativeUrl
โ€ข EventSource
โ€ข ExternalAccess
โ€ข SourceFileName
โ€ข SourceRelativeUrl
โ€ข Subject
โ€ข Target
โ€ข UserAgent
โ€ข UserID
โ€ข UserKey
โ€ข UserSharedWith
โ€ข UserType
โ€ข Workload
โ€ข ID
โ€ข InternalLogonType
โ€ข ItemType
โ€ข LogonType
โ€ข MailboxGuid
โ€ข MailboxOwnerUPN
โ€ข ModifiedProperties
โ€ข ObjectID
โ€ข Operation
โ€ข OrganizationID
โ€ข Path
โ€ข Parameters
โ€ข RecordType
โ€ข ResultStatus
โ€ข SharingType
โ€ข Site
โ€ข SiteUrl
โ€ข SourceFileExtension
2. Comprehensive Event Logging
โ€ข User and administrator events are logged as users work within Office 365
โ€ข Over 150 events logged (Ex. view a file, mailbox owner activities, Azure AD login, etc.)
โ€ข 9 Event Categories
โ€ข Exchange admin events
โ€ข Exchange mailbox events
โ€ข File and folder events (SharePoint and OneDrive for Business)
โ€ข Invitation and access request events (SharePoint and OneDrive for Business)
โ€ข Sharing events (SharePoint and OneDrive for Business)
โ€ข Site administration events (SharePoint and OneDrive for Business)
โ€ข Synchronization events (SharePoint and OneDrive for Business)
โ€ข Azure Active Directory events (Admin Activity and User Login)
2. Comprehensive Event Logging
โ€ข Example: File and Folder Events
Event Friendly name Description
FileCheckedIn File checked in User checks in a document that they checked out from a SharePoint or OneDrive for Business document library.
FileCheckedOut File checked out
User checks out a document located in a SharePoint or OneDrive for Business document library. Users can check out and make
changes to documents that have been shared with them.
FileCheckOutDiscarded
File checkout
discarded
User discards (or undos) a checked out file. That means any changes they made to the file when it was checked out are discarded,
and not saved to the version of the document in the document library.
FileCopied File copied User copies a document from a SharePoint or OneDrive for Business site. The copied file can be saved to another folder on the site.
FileDeleted File deleted User deletes a document from a SharePoint or OneDrive for Business site.
FileDownloaded File downloaded User downloads a document from a SharePoint or OneDrive for Business site.
FileFetched File accessed
User or system account accesses a file. When a user or the system performs an operation on a file, the file has to be located and
accessed. The FileFetched event indicates that retrieval action. Note that many file and folder related events will have one or more
corresponding FileFetched log entries.
FileModified File modified
User or system account modifies the content or the properties of a document located on a SharePoint or OneDrive for Business
site.
FileMoved File moved User moves a document from its current location on a SharePoint or OneDrive for Business site to a new location..
FileRenamed File renamed User renames a document on a SharePoint or OneDrive for Business site.
FileRestored File restored User restores a document from the recycle bin of a SharePoint or OneDrive for Business site.
FileUploaded File uploaded User uploads a document to a folder on a SharePoint or OneDrive for Business site.
FileViewed File viewed User views a document on a SharePoint or OneDrive for Business site. System accounts can also generate FileViewed events.
2. Comprehensive Event Logging
โ€ข Example: Sharing Events
Event Friendly name Description
ExternalSharingSet
File or folder shared with
external user
User shares a file or folder located in SharePoint or OneDrive for Business with a user outside their organization.
SharedLinkCreated Sharing link created
User creates a link to a shared file in SharePoint or OneDrive for Business. This link can be sent to other people to
give them access to the file. A user can create two types of links: a link that allows a user to view and edit the shared
file, or a link that allows the user to just view the file.
SharedLinkDisabled Sharing link disabled User disables (permanently) a link that was created to share a file.
SharingRevoked File or folder unshared
User unshares a file or folder that was previously shared with other users. This event is logged when a user stops
sharing a file with other users.
SharingSet File or folder shared User shares a file or folder located in SharePoint or OneDrive for Business with another user inside their organization.
3. Search Powershell Cmdlet
โ€ข PowerShell Cmdlet: Search-UnifiedAuditLog
Examples:
Search-UnifiedAuditLog -StartDate September 1, 2015 -EndDate September 30, 2015
Search-UnifiedAuditLog -StartDate 9/1/2015 -EndDate 9/30/2015 -RecordType SharePointFileOperation -Operations FileViewed -
ObjectIds docx
โ€ข Script searches of the event logs, looking for specific details
โ€ข Export logs to a file
โ€ข Automate searches and reporting
4. Management Activity API (*Limited Preview)
โ€ข Integrate Office 365 activity data into internal or 3rd party security and compliance
monitoring and reporting solutions
โ€ข Grant rights for your application to access event data using Azure AD
Register the application in Azure AD to establish an identity for your application and specify the permission levels it
needs in order to access the APIs
โ€ข Let the Office 365 service know if your application has rights to access it
Office 365 tenant admin must explicitly grant consent to allow your application to access their tenant data through
the APIs.
โ€ข Request Access Tokens from Azure AD
Using the applicationโ€™s credentials (as in Azure AD) the application will request โ€œapp-onlyโ€ access tokens for a
consented tenant on an ongoing basis, without the need for further tenant admin interaction.
โ€ข Start Calling the Management API
Subscribe to content types; Receive notifications when content is available; Retrieve content as JSON
*During the limited preview period only registered participants may actually retrieve data through the API.
In Summary
โ€ข Activity Monitoring/Reporting is just 1 aspect of Securing Information Systems
โ€ข Key Drivers for Monitoring Activity and Auditing our Systems:
โ€ข Enhance Compliance with Regulatory Standards
โ€ข Enhance Access Control and Visibility into User Activity related to Content
โ€ข Enable Detailed Investigations
โ€ข Provides deep visibility into user activity & integration with internal/3rd party tools
โ€ข SharePoint Online, One Drive for Business, Exchange Online and Azure AD
โ€ข Accessed through the Office 365 Compliance Center
โ€ข Some also reports accessed through Exchange Audit Reports and Azure AD Audit Reports
*Slides will be available on my blog at www.trustsharepoint.com.
Questions
Antonio Maio
Antonio.Maio@protiviti.com
@AntonioMaio2
SharePoint.Protiviti.com/Webinars
Julia Marple
Julia.Marple@protiviti.com
@ProtivitiSP
Thank You!

More Related Content

Viewers also liked

Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...Edge Pereira
ย 
FireEye Systems Engineer
FireEye Systems EngineerFireEye Systems Engineer
FireEye Systems EngineerDediHusniHasyim
ย 
[Infographic] Email: The First Security Gap Targeted by Attackers
[Infographic] Email: The First Security Gap Targeted by Attackers[Infographic] Email: The First Security Gap Targeted by Attackers
[Infographic] Email: The First Security Gap Targeted by AttackersFireEye, Inc.
ย 
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......centralohioissa
ย 
Email Security Best Practices
Email Security Best PracticesEmail Security Best Practices
Email Security Best PracticesKnowBe4
ย 
Detect & Remediate Malware & Advanced Targeted Attacks
Detect & Remediate Malware & Advanced Targeted AttacksDetect & Remediate Malware & Advanced Targeted Attacks
Detect & Remediate Malware & Advanced Targeted AttacksImperva
ย 
Fire Eye Appliance Quick Start
Fire Eye Appliance Quick StartFire Eye Appliance Quick Start
Fire Eye Appliance Quick StartContent Rules, Inc.
ย 
FireEye
FireEyeFireEye
FireEyegigamon
ย 
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does ItAMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does ItNikhil Mittal
ย 
FireEye Use Cases โ€” FireEye Solution Deployment Experience
FireEye Use Cases โ€” FireEye Solution Deployment ExperienceFireEye Use Cases โ€” FireEye Solution Deployment Experience
FireEye Use Cases โ€” FireEye Solution Deployment ExperienceValery Yelanin
ย 
ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)Digital Bond
ย 

Viewers also liked (11)

Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
ย 
FireEye Systems Engineer
FireEye Systems EngineerFireEye Systems Engineer
FireEye Systems Engineer
ย 
[Infographic] Email: The First Security Gap Targeted by Attackers
[Infographic] Email: The First Security Gap Targeted by Attackers[Infographic] Email: The First Security Gap Targeted by Attackers
[Infographic] Email: The First Security Gap Targeted by Attackers
ย 
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
ย 
Email Security Best Practices
Email Security Best PracticesEmail Security Best Practices
Email Security Best Practices
ย 
Detect & Remediate Malware & Advanced Targeted Attacks
Detect & Remediate Malware & Advanced Targeted AttacksDetect & Remediate Malware & Advanced Targeted Attacks
Detect & Remediate Malware & Advanced Targeted Attacks
ย 
Fire Eye Appliance Quick Start
Fire Eye Appliance Quick StartFire Eye Appliance Quick Start
Fire Eye Appliance Quick Start
ย 
FireEye
FireEyeFireEye
FireEye
ย 
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does ItAMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It
ย 
FireEye Use Cases โ€” FireEye Solution Deployment Experience
FireEye Use Cases โ€” FireEye Solution Deployment ExperienceFireEye Use Cases โ€” FireEye Solution Deployment Experience
FireEye Use Cases โ€” FireEye Solution Deployment Experience
ย 
ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)
ย 

More from AntonioMaio2

Introduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + SecurityIntroduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + SecurityAntonioMaio2
ย 
Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365AntonioMaio2
ย 
A beginners guide to administering office 365 with power shell antonio maio
A beginners guide to administering office 365 with power shell   antonio maioA beginners guide to administering office 365 with power shell   antonio maio
A beginners guide to administering office 365 with power shell antonio maioAntonioMaio2
ย 
Office 365 Security - MacGyver, Ninja or Swat team
Office 365 Security -  MacGyver, Ninja or Swat teamOffice 365 Security -  MacGyver, Ninja or Swat team
Office 365 Security - MacGyver, Ninja or Swat teamAntonioMaio2
ย 
Information security in office 365 a shared responsibility - antonio maio
Information security in office 365   a shared responsibility - antonio maioInformation security in office 365   a shared responsibility - antonio maio
Information security in office 365 a shared responsibility - antonio maioAntonioMaio2
ย 
Office 365 security new innovations from microsoft ignite - antonio maio
Office 365 security   new innovations from microsoft ignite - antonio maioOffice 365 security   new innovations from microsoft ignite - antonio maio
Office 365 security new innovations from microsoft ignite - antonio maioAntonioMaio2
ย 
Identity management challenges when moving share point to the cloud antonio...
Identity management challenges when moving share point to the cloud   antonio...Identity management challenges when moving share point to the cloud   antonio...
Identity management challenges when moving share point to the cloud antonio...AntonioMaio2
ย 
A Practical Guide Information Governance with Microsoft SharePoint 2013
A Practical Guide Information Governance with Microsoft SharePoint 2013A Practical Guide Information Governance with Microsoft SharePoint 2013
A Practical Guide Information Governance with Microsoft SharePoint 2013AntonioMaio2
ย 
Best practices for security and governance in share point 2013 published
Best practices for security and governance in share point 2013   publishedBest practices for security and governance in share point 2013   published
Best practices for security and governance in share point 2013 publishedAntonioMaio2
ย 
Keeping SharePoint Always On
Keeping SharePoint Always OnKeeping SharePoint Always On
Keeping SharePoint Always OnAntonioMaio2
ย 
How Claims is Changing the Way We Authenticate and Authorize in SharePoint
How Claims is Changing the Way We Authenticate and Authorize in SharePointHow Claims is Changing the Way We Authenticate and Authorize in SharePoint
How Claims is Changing the Way We Authenticate and Authorize in SharePointAntonioMaio2
ย 
Best practices for Security and Governance in SharePoint 2013
Best practices for Security and Governance in SharePoint 2013Best practices for Security and Governance in SharePoint 2013
Best practices for Security and Governance in SharePoint 2013AntonioMaio2
ย 
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...AntonioMaio2
ย 
Best Practices for Security in Microsoft SharePoint 2013
Best Practices for Security in Microsoft SharePoint 2013Best Practices for Security in Microsoft SharePoint 2013
Best Practices for Security in Microsoft SharePoint 2013AntonioMaio2
ย 
Intro to Develop and Deploy Apps for Microsoft SharePoint and Office 2013
Intro to Develop and Deploy Apps for Microsoft SharePoint and Office 2013Intro to Develop and Deploy Apps for Microsoft SharePoint and Office 2013
Intro to Develop and Deploy Apps for Microsoft SharePoint and Office 2013AntonioMaio2
ย 
SharePoint Governance: Impacts of Moving to the Cloud
SharePoint Governance: Impacts of Moving to the CloudSharePoint Governance: Impacts of Moving to the Cloud
SharePoint Governance: Impacts of Moving to the CloudAntonioMaio2
ย 
Share point security 101 sps-ottawa 2012 - antonio maio
Share point security 101   sps-ottawa 2012 - antonio maioShare point security 101   sps-ottawa 2012 - antonio maio
Share point security 101 sps-ottawa 2012 - antonio maioAntonioMaio2
ย 
Webinar: Take Control of SharePoint Security
Webinar: Take Control of SharePoint SecurityWebinar: Take Control of SharePoint Security
Webinar: Take Control of SharePoint SecurityAntonioMaio2
ย 
SharePoint Saturday Toronto July 2012 - Antonio Maio
SharePoint Saturday Toronto July 2012 - Antonio MaioSharePoint Saturday Toronto July 2012 - Antonio Maio
SharePoint Saturday Toronto July 2012 - Antonio MaioAntonioMaio2
ย 

More from AntonioMaio2 (19)

Introduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + SecurityIntroduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + Security
ย 
Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365
ย 
A beginners guide to administering office 365 with power shell antonio maio
A beginners guide to administering office 365 with power shell   antonio maioA beginners guide to administering office 365 with power shell   antonio maio
A beginners guide to administering office 365 with power shell antonio maio
ย 
Office 365 Security - MacGyver, Ninja or Swat team
Office 365 Security -  MacGyver, Ninja or Swat teamOffice 365 Security -  MacGyver, Ninja or Swat team
Office 365 Security - MacGyver, Ninja or Swat team
ย 
Information security in office 365 a shared responsibility - antonio maio
Information security in office 365   a shared responsibility - antonio maioInformation security in office 365   a shared responsibility - antonio maio
Information security in office 365 a shared responsibility - antonio maio
ย 
Office 365 security new innovations from microsoft ignite - antonio maio
Office 365 security   new innovations from microsoft ignite - antonio maioOffice 365 security   new innovations from microsoft ignite - antonio maio
Office 365 security new innovations from microsoft ignite - antonio maio
ย 
Identity management challenges when moving share point to the cloud antonio...
Identity management challenges when moving share point to the cloud   antonio...Identity management challenges when moving share point to the cloud   antonio...
Identity management challenges when moving share point to the cloud antonio...
ย 
A Practical Guide Information Governance with Microsoft SharePoint 2013
A Practical Guide Information Governance with Microsoft SharePoint 2013A Practical Guide Information Governance with Microsoft SharePoint 2013
A Practical Guide Information Governance with Microsoft SharePoint 2013
ย 
Best practices for security and governance in share point 2013 published
Best practices for security and governance in share point 2013   publishedBest practices for security and governance in share point 2013   published
Best practices for security and governance in share point 2013 published
ย 
Keeping SharePoint Always On
Keeping SharePoint Always OnKeeping SharePoint Always On
Keeping SharePoint Always On
ย 
How Claims is Changing the Way We Authenticate and Authorize in SharePoint
How Claims is Changing the Way We Authenticate and Authorize in SharePointHow Claims is Changing the Way We Authenticate and Authorize in SharePoint
How Claims is Changing the Way We Authenticate and Authorize in SharePoint
ย 
Best practices for Security and Governance in SharePoint 2013
Best practices for Security and Governance in SharePoint 2013Best practices for Security and Governance in SharePoint 2013
Best practices for Security and Governance in SharePoint 2013
ย 
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
ย 
Best Practices for Security in Microsoft SharePoint 2013
Best Practices for Security in Microsoft SharePoint 2013Best Practices for Security in Microsoft SharePoint 2013
Best Practices for Security in Microsoft SharePoint 2013
ย 
Intro to Develop and Deploy Apps for Microsoft SharePoint and Office 2013
Intro to Develop and Deploy Apps for Microsoft SharePoint and Office 2013Intro to Develop and Deploy Apps for Microsoft SharePoint and Office 2013
Intro to Develop and Deploy Apps for Microsoft SharePoint and Office 2013
ย 
SharePoint Governance: Impacts of Moving to the Cloud
SharePoint Governance: Impacts of Moving to the CloudSharePoint Governance: Impacts of Moving to the Cloud
SharePoint Governance: Impacts of Moving to the Cloud
ย 
Share point security 101 sps-ottawa 2012 - antonio maio
Share point security 101   sps-ottawa 2012 - antonio maioShare point security 101   sps-ottawa 2012 - antonio maio
Share point security 101 sps-ottawa 2012 - antonio maio
ย 
Webinar: Take Control of SharePoint Security
Webinar: Take Control of SharePoint SecurityWebinar: Take Control of SharePoint Security
Webinar: Take Control of SharePoint Security
ย 
SharePoint Saturday Toronto July 2012 - Antonio Maio
SharePoint Saturday Toronto July 2012 - Antonio MaioSharePoint Saturday Toronto July 2012 - Antonio Maio
SharePoint Saturday Toronto July 2012 - Antonio Maio
ย 

Recently uploaded

VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...SUHANI PANDEY
ย 
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
ย 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
ย 
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
ย 
๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹nirzagarg
ย 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdfMatthew Sinclair
ย 
WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)
WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)
WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)Delhi Call girls
ย 
Top Rated Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
ย 
๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ
๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ
๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
ย 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
ย 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls DubaiEscorts Call Girls
ย 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
ย 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...SUHANI PANDEY
ย 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...singhpriety023
ย 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...SUHANI PANDEY
ย 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
ย 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...SUHANI PANDEY
ย 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"growthgrids
ย 

Recently uploaded (20)

VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
ย 
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
ย 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
ย 
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
ย 
๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
ย 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
ย 
WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)
WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)
WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)
ย 
Top Rated Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...
ย 
๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ
๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ
๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ
ย 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
ย 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
ย 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
ย 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
ย 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
ย 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
ย 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
ย 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
ย 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
ย 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
ย 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
ย 

Securing Office 365 with Activity Monitoring

  • 1. Securing Office 365 with Activity Monitoring Thank you for joining our webinar! We will begin shortly.
  • 2. Introduction โ€ข โ€˜30 on Thursdayโ€™ Series โ€ข Bi-weekly 30 minute webinar series โ€ข Next Webinar: โ€ข October 22: โ€œBuilding Nintex Mobile Appsโ€ โ€ข Full Schedule: SharePoint.Protiviti.com/Webinars
  • 3. Live Tweeting! Tweet us your questions & feedback during the webinar! Tweet @ProtivitiSP and use #30TOffice365
  • 4. Todayโ€™s Session โ€ข Todayโ€™s session is being recorded โ€ข Archive of past sessions โ€ข SharePoint.Protiviti.com/ArchivedWebinars โ€ข Questions - Use the Question Window or tweet us your questions @ProtivitiSP using #30TOffice365
  • 5. Session Overview โ€ข Topic: โ€ข Securing Office 365 with Activity Monitoring โ€ข Presenter: โ€ข Antonio Maio, SharePoint MVP โ€ข Moderator: โ€ข Julia Marple, Protiviti
  • 7. Why Monitor and Audit Our Systems? โ€ข Meet Regulatory Compliance Obligations โ€ข Investigate Data Breaches โ€ข Audit Access to Sensitive Content
  • 8. Office 365 Activity Monitoring Capabilities 1. Office 365 Activity Report 2. Comprehensive Event Logging 3. Search Powershell Cmdlet 4. Management Activity API
  • 9. 1. Office 365 Activity Report โ€ข Login to Office 365 โ€ข Navigate to Admin > Compliance Center > Reports > Office 365 Activity Report
  • 10. 1. Office 365 Activity Report โ€ข Search across SharePoint Online, OneDrive for Business, Exchange Online, Azure AD โ€ข Search by users, file, folder, site, by date range โ€ข Search by type of activity โ€ข View Activity Details (Details Pane) โ€ข Run Report on Demand โ€ข Export results to CSV
  • 11. 1. Office 365 Activity Report โ€ข With each event, up to 37 event properties are logged โ€ข Actor โ€ข ClientIP โ€ข ClientProcessName โ€ข CreationTime โ€ข DestinationFileExtension โ€ข DestinationFileName โ€ข DestinationRelativeUrl โ€ข EventSource โ€ข ExternalAccess โ€ข SourceFileName โ€ข SourceRelativeUrl โ€ข Subject โ€ข Target โ€ข UserAgent โ€ข UserID โ€ข UserKey โ€ข UserSharedWith โ€ข UserType โ€ข Workload โ€ข ID โ€ข InternalLogonType โ€ข ItemType โ€ข LogonType โ€ข MailboxGuid โ€ข MailboxOwnerUPN โ€ข ModifiedProperties โ€ข ObjectID โ€ข Operation โ€ข OrganizationID โ€ข Path โ€ข Parameters โ€ข RecordType โ€ข ResultStatus โ€ข SharingType โ€ข Site โ€ข SiteUrl โ€ข SourceFileExtension
  • 12. 2. Comprehensive Event Logging โ€ข User and administrator events are logged as users work within Office 365 โ€ข Over 150 events logged (Ex. view a file, mailbox owner activities, Azure AD login, etc.) โ€ข 9 Event Categories โ€ข Exchange admin events โ€ข Exchange mailbox events โ€ข File and folder events (SharePoint and OneDrive for Business) โ€ข Invitation and access request events (SharePoint and OneDrive for Business) โ€ข Sharing events (SharePoint and OneDrive for Business) โ€ข Site administration events (SharePoint and OneDrive for Business) โ€ข Synchronization events (SharePoint and OneDrive for Business) โ€ข Azure Active Directory events (Admin Activity and User Login)
  • 13. 2. Comprehensive Event Logging โ€ข Example: File and Folder Events Event Friendly name Description FileCheckedIn File checked in User checks in a document that they checked out from a SharePoint or OneDrive for Business document library. FileCheckedOut File checked out User checks out a document located in a SharePoint or OneDrive for Business document library. Users can check out and make changes to documents that have been shared with them. FileCheckOutDiscarded File checkout discarded User discards (or undos) a checked out file. That means any changes they made to the file when it was checked out are discarded, and not saved to the version of the document in the document library. FileCopied File copied User copies a document from a SharePoint or OneDrive for Business site. The copied file can be saved to another folder on the site. FileDeleted File deleted User deletes a document from a SharePoint or OneDrive for Business site. FileDownloaded File downloaded User downloads a document from a SharePoint or OneDrive for Business site. FileFetched File accessed User or system account accesses a file. When a user or the system performs an operation on a file, the file has to be located and accessed. The FileFetched event indicates that retrieval action. Note that many file and folder related events will have one or more corresponding FileFetched log entries. FileModified File modified User or system account modifies the content or the properties of a document located on a SharePoint or OneDrive for Business site. FileMoved File moved User moves a document from its current location on a SharePoint or OneDrive for Business site to a new location.. FileRenamed File renamed User renames a document on a SharePoint or OneDrive for Business site. FileRestored File restored User restores a document from the recycle bin of a SharePoint or OneDrive for Business site. FileUploaded File uploaded User uploads a document to a folder on a SharePoint or OneDrive for Business site. FileViewed File viewed User views a document on a SharePoint or OneDrive for Business site. System accounts can also generate FileViewed events.
  • 14. 2. Comprehensive Event Logging โ€ข Example: Sharing Events Event Friendly name Description ExternalSharingSet File or folder shared with external user User shares a file or folder located in SharePoint or OneDrive for Business with a user outside their organization. SharedLinkCreated Sharing link created User creates a link to a shared file in SharePoint or OneDrive for Business. This link can be sent to other people to give them access to the file. A user can create two types of links: a link that allows a user to view and edit the shared file, or a link that allows the user to just view the file. SharedLinkDisabled Sharing link disabled User disables (permanently) a link that was created to share a file. SharingRevoked File or folder unshared User unshares a file or folder that was previously shared with other users. This event is logged when a user stops sharing a file with other users. SharingSet File or folder shared User shares a file or folder located in SharePoint or OneDrive for Business with another user inside their organization.
  • 15. 3. Search Powershell Cmdlet โ€ข PowerShell Cmdlet: Search-UnifiedAuditLog Examples: Search-UnifiedAuditLog -StartDate September 1, 2015 -EndDate September 30, 2015 Search-UnifiedAuditLog -StartDate 9/1/2015 -EndDate 9/30/2015 -RecordType SharePointFileOperation -Operations FileViewed - ObjectIds docx โ€ข Script searches of the event logs, looking for specific details โ€ข Export logs to a file โ€ข Automate searches and reporting
  • 16. 4. Management Activity API (*Limited Preview) โ€ข Integrate Office 365 activity data into internal or 3rd party security and compliance monitoring and reporting solutions โ€ข Grant rights for your application to access event data using Azure AD Register the application in Azure AD to establish an identity for your application and specify the permission levels it needs in order to access the APIs โ€ข Let the Office 365 service know if your application has rights to access it Office 365 tenant admin must explicitly grant consent to allow your application to access their tenant data through the APIs. โ€ข Request Access Tokens from Azure AD Using the applicationโ€™s credentials (as in Azure AD) the application will request โ€œapp-onlyโ€ access tokens for a consented tenant on an ongoing basis, without the need for further tenant admin interaction. โ€ข Start Calling the Management API Subscribe to content types; Receive notifications when content is available; Retrieve content as JSON *During the limited preview period only registered participants may actually retrieve data through the API.
  • 17. In Summary โ€ข Activity Monitoring/Reporting is just 1 aspect of Securing Information Systems โ€ข Key Drivers for Monitoring Activity and Auditing our Systems: โ€ข Enhance Compliance with Regulatory Standards โ€ข Enhance Access Control and Visibility into User Activity related to Content โ€ข Enable Detailed Investigations โ€ข Provides deep visibility into user activity & integration with internal/3rd party tools โ€ข SharePoint Online, One Drive for Business, Exchange Online and Azure AD โ€ข Accessed through the Office 365 Compliance Center โ€ข Some also reports accessed through Exchange Audit Reports and Azure AD Audit Reports *Slides will be available on my blog at www.trustsharepoint.com.