SlideShare ist ein Scribd-Unternehmen logo
1 von 23
A W A R D W I N N I N G E X C H A N G E & O F F I C E 3 6 5 M A N A G E M E N T
Auditing and Reporting for Office 365
A W A R D W I N N I N G E X C H A N G E & O F F I C E 3 6 5 M A N A G E M E N T
@enowconsulting
Find us!
ENow Software
ENowSoftware
ENowSoftware.com
Some of ENow’s Loyal Customers
• Microsoft Silver ISV & Messaging Microsoft Partner
• Focused on building software solutions that simplify the life of IT administrators
• Software architected by MVPs with >15 years experience in high-end Microsoft
consulting and management
• Customers in over 60 countries ENow Software
About ENow
A W A R D W I N N I N G E X C H A N G E & O F F I C E 3 6 5 M A N A G E M E N T
A W A R D W I N N I N G E X C H A N G E & O F F I C E 3 6 5 M A N A G E M E N T
About the speaker – Nathan O’Bryan
MVP: Office Servers and Services
MCSM: Messaging
Consultant @ SPS
http://www.spscom.com
@MCSMLab
http://www.mcsmlab.com
A W A R D W I N N I N G E X C H A N G E & O F F I C E 3 6 5 M A N A G E M E N T
Introduction
• Auditing and reporting is important to any organization
• Office 365 is a collection of different resources, all developed
separately
• Microsoft is working toward a unified auditing and reporting system,
but they are not there yet
A W A R D W I N N I N G E X C H A N G E & O F F I C E 3 6 5 M A N A G E M E N T
Auditing and Reporting
• In Office 365, auditing and reporting is broken into two groups
• Exchange
• Everything else
• “Everything else” is far behind Exchange for auditing and reporting features
• All auditing and reporting in Office 365 requires Exchange in your tenant
• Microsoft is working on bringing “everything else” up to the auditing and
reporting standards of Exchange
A W A R D W I N N I N G E X C H A N G E & O F F I C E 3 6 5 M A N A G E M E N T
Mailbox Auditing
• Mailbox auditing is about figuring out who did what and when they
did it
• First introduced in Exchange 2007 SP2
• 3 types of mailbox auditing
• Owner
• Delegates
• Administrator
• Mailbox auditing is not on by default
A W A R D W I N N I N G E X C H A N G E & O F F I C E 3 6 5 M A N A G E M E N T
Demo 1 – Enable Mailbox Auditing
• Verify mailbox auditing is on for a mailbox
• Verify mailbox auditing is on for multiple mailboxes
• Turn mailbox auditing on
• Verify what actions are being audited
A W A R D W I N N I N G E X C H A N G E & O F F I C E 3 6 5 M A N A G E M E N T
Mailbox actions logged
Action Description Admin Delegate Owner
Copy An item is copied to another folder. Yes No No
Create
An item is created in the Calendar, Contacts, Notes, or Tasks folder in the mailbox; for example, a new meeting request is
created. Note that message or folder creation isn't audited.
Yes* Yes* Yes
FolderBind A mailbox folder is accessed. Yes* Yes No
HardDelete An item is deleted permanently from the Recoverable Items folder. Yes* Yes* Yes
MailboxLogin The user signed in to their mailbox. No No Yes
MessageBind An item is accessed in the reading pane or opened. Yes No No
Move An item is moved to another folder. Yes* Yes Yes
MoveToDeletedItems An item is moved to the Deleted Items folder. Yes* Yes Yes
SendAs A message is sent using Send As permissions. Yes* Yes* No
SendOnBehalf A message is sent using Send on Behalf permissions. Yes* Yes No
SoftDelete An item is deleted from the Deleted Items folder. Yes* Yes* Yes
Update An item's properties are updated. Yes* Yes* Yes
* Audited by default if auditing is enabled for a mailbox.
A W A R D W I N N I N G E X C H A N G E & O F F I C E 3 6 5 M A N A G E M E N T
Demo 2 – Configuring Mailbox Auditing
• Set what actions are audited
• Set audit log age limit
• Determine size of mailbox audit log
• Delete mailbox audit log entries
A W A R D W I N N I N G E X C H A N G E & O F F I C E 3 6 5 M A N A G E M E N T
Demo 3 – Searching Mailbox Audit Log
• Search mailbox audit log
• Search for limited results
• Search for specific actions on specific dates
• Start mailbox audit log report
• Search for external access
• Show running audit log searches
A W A R D W I N N I N G E X C H A N G E & O F F I C E 3 6 5 M A N A G E M E N T
Auditing across Office 365 applications
• Recently Microsoft has added more auditing and reporting around
SharePoint Online and OneDrive
• Office 365 compliance center
• Search-UnifiedAuditLog
• AzureActiveDirectory
• AzureActiveDirectoryAccountLogon
• ExchangeAdmin
• ExchangeItem
• ExchangeItemGroup
• SharePoint
• SharePointFileOperation
A W A R D W I N N I N G E X C H A N G E & O F F I C E 3 6 5 M A N A G E M E N T
Audit Storage Architecture
A W A R D W I N N I N G E X C H A N G E & O F F I C E 3 6 5 M A N A G E M E N T
Demo 4 – Search Unified Audit Log
• Search unified audit log
• Convert audit data from JSON format
• Search for SharePoint file operations
• Search for Azure AD operations
• Search for Azure AD account login operations
A W A R D W I N N I N G E X C H A N G E & O F F I C E 3 6 5 M A N A G E M E N T
Reporting web service
Office 365 Reporting web service
reference page
Office 365 reporting-related
Windows PowerShell cmdlets
CsActiveUser* reports Get-CsAVConferenceTimeReport
CsAVConferenceTime* reports Get-CsActiveUserReport
CsConference* reports Get-CsConferenceReport
CsP2PAVTime* reports Get-CsP2PAVTimeReport
CsP2PSession* reports Get-CsP2PSessionReport
ConnectionbyClientType* reports Get-ConnectionByClientTypeReport
ConnectionbyClientTypeDetail* reports Get-ConnectionByClientTypeDetailReport
GroupActivity* reports Get-GroupActivityReport
MailboxActivity* reports Get-MailboxActivityReport
MailboxUsage report Get-MailboxUsageReport
MailboxUsageDetail report Get-MailboxUsageDetailReport
MailDetail report Get-MailDetailReport
MailDetailDlpPolicy report Get-MailDetailDlpPolicyReport
MailDetailMalware report Get-MailDetailMalwareReport
MailDetailSpam report Get-MailDetailSpamReport
MailDetailTransportRule report Get-MailDetailTransportRuleReport
MailFilterList report Get-MailFilterListReport
MailTraffic report Get-MailTrafficReport
MailTrafficPolicy report Get-MailTrafficPolicyReport
MailTrafficSummary reports Get-MailTrafficSummaryReport
MailTrafficTop report Get-MailTrafficTopReport
MessageTrace report Get-MessageTrace
MessageTraceDetail report Get-MessageTraceDetail
MxRecordReport report Get-MxRecordReport
OutboundConnectorReport report Get-OutboundConnectorReport
ServiceDeliveryReport report Get-ServiceDeliveryReport
StaleMailbox report Get-StaleMailboxReport
StaleMailboxDetail report Get-StaleMailboxDetailReport
A W A R D W I N N I N G E X C H A N G E & O F F I C E 3 6 5 M A N A G E M E N T
Demo 5 – Reporting Web Service
• Mx record report
• Outbound connector report
• Mail traffic summary report
• Stale mailbox detail report
• Connection by client type report
• Av conference time report
A W A R D W I N N I N G E X C H A N G E & O F F I C E 3 6 5 M A N A G E M E N T
Security & Compliance Center
• Intended to be single portal for all Security & Compliance
administration needs
• Work in progress
A W A R D W I N N I N G E X C H A N G E & O F F I C E 3 6 5 M A N A G E M E N T
Demo 6 – Security & Compliance Center
• Separate PowerShell connection
• Available commands
• Reports
• Compliance Search
A W A R D W I N N I N G E X C H A N G E & O F F I C E 3 6 5 M A N A G E M E N T
Accessing GUI Mailbox Audit Reports
• EAC > Compliance Management > Auditing
• Office 365 Compliance Center
A W A R D W I N N I N G E X C H A N G E & O F F I C E 3 6 5 M A N A G E M E N T
Demo 7 – Office 365 GUI reports
A W A R D W I N N I N G E X C H A N G E & O F F I C E 3 6 5 M A N A G E M E N T
Summary
• PowerShell is the best native way to get information out of Office 365
auditing and reporting
• Office 365 canned reports are not currently very flexible
• PowerShell reports may not be acceptable for management
A W A R D W I N N I N G E X C H A N G E & O F F I C E 3 6 5 M A N A G E M E N T
Q&A
A W A R D W I N N I N G E X C H A N G E & O F F I C E 3 6 5 M A N A G E M E N T
Thank You
www.enowsoftware.com

Weitere ähnliche Inhalte

Andere mochten auch

Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......centralohioissa
 
Email Security Best Practices
Email Security Best PracticesEmail Security Best Practices
Email Security Best PracticesKnowBe4
 
Detect & Remediate Malware & Advanced Targeted Attacks
Detect & Remediate Malware & Advanced Targeted AttacksDetect & Remediate Malware & Advanced Targeted Attacks
Detect & Remediate Malware & Advanced Targeted AttacksImperva
 
Fire Eye Appliance Quick Start
Fire Eye Appliance Quick StartFire Eye Appliance Quick Start
Fire Eye Appliance Quick StartContent Rules, Inc.
 
FireEye
FireEyeFireEye
FireEyegigamon
 
FireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceFireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceValery Yelanin
 
Microsoft Office 365
Microsoft Office 365Microsoft Office 365
Microsoft Office 365Novosco
 
ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)Digital Bond
 
FireEye - Breaches are inevitable, but the outcome is not
FireEye - Breaches are inevitable, but the outcome is not FireEye - Breaches are inevitable, but the outcome is not
FireEye - Breaches are inevitable, but the outcome is not MarketingArrowECS_CZ
 
10 Things Many IT Professionals Don’t Know About Office 365
10 Things Many IT Professionals Don’t Know About Office 36510 Things Many IT Professionals Don’t Know About Office 365
10 Things Many IT Professionals Don’t Know About Office 365Richard Harbridge
 
Andy Malone - Microsoft office 365 security deep dive
Andy Malone - Microsoft office 365 security deep diveAndy Malone - Microsoft office 365 security deep dive
Andy Malone - Microsoft office 365 security deep diveNordic Infrastructure Conference
 
No Easy Breach DerbyCon 2016
No Easy Breach DerbyCon 2016No Easy Breach DerbyCon 2016
No Easy Breach DerbyCon 2016Matthew Dunwoody
 

Andere mochten auch (12)

Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
 
Email Security Best Practices
Email Security Best PracticesEmail Security Best Practices
Email Security Best Practices
 
Detect & Remediate Malware & Advanced Targeted Attacks
Detect & Remediate Malware & Advanced Targeted AttacksDetect & Remediate Malware & Advanced Targeted Attacks
Detect & Remediate Malware & Advanced Targeted Attacks
 
Fire Eye Appliance Quick Start
Fire Eye Appliance Quick StartFire Eye Appliance Quick Start
Fire Eye Appliance Quick Start
 
FireEye
FireEyeFireEye
FireEye
 
FireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceFireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment Experience
 
Microsoft Office 365
Microsoft Office 365Microsoft Office 365
Microsoft Office 365
 
ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)
 
FireEye - Breaches are inevitable, but the outcome is not
FireEye - Breaches are inevitable, but the outcome is not FireEye - Breaches are inevitable, but the outcome is not
FireEye - Breaches are inevitable, but the outcome is not
 
10 Things Many IT Professionals Don’t Know About Office 365
10 Things Many IT Professionals Don’t Know About Office 36510 Things Many IT Professionals Don’t Know About Office 365
10 Things Many IT Professionals Don’t Know About Office 365
 
Andy Malone - Microsoft office 365 security deep dive
Andy Malone - Microsoft office 365 security deep diveAndy Malone - Microsoft office 365 security deep dive
Andy Malone - Microsoft office 365 security deep dive
 
No Easy Breach DerbyCon 2016
No Easy Breach DerbyCon 2016No Easy Breach DerbyCon 2016
No Easy Breach DerbyCon 2016
 

Mehr von ENow Software

Are you ready for Exchange 2016
Are you ready for Exchange 2016Are you ready for Exchange 2016
Are you ready for Exchange 2016ENow Software
 
Identity Management Over the Horizon: What’s New and What’s Next
Identity Management Over the Horizon: What’s New and What’s NextIdentity Management Over the Horizon: What’s New and What’s Next
Identity Management Over the Horizon: What’s New and What’s NextENow Software
 
Lync & Skype Interop V2 Deep Dive - By Johan Delimon
Lync & Skype Interop  V2 Deep Dive - By Johan DelimonLync & Skype Interop  V2 Deep Dive - By Johan Delimon
Lync & Skype Interop V2 Deep Dive - By Johan DelimonENow Software
 
Troubleshooting Exchange Hybrid Deployments
Troubleshooting Exchange Hybrid DeploymentsTroubleshooting Exchange Hybrid Deployments
Troubleshooting Exchange Hybrid DeploymentsENow Software
 
Top 10 Tips for Supporting & Troubleshooting Lync 2013
Top 10 Tips for Supporting & Troubleshooting Lync 2013Top 10 Tips for Supporting & Troubleshooting Lync 2013
Top 10 Tips for Supporting & Troubleshooting Lync 2013ENow Software
 
What Exchange Administrators Need to Know About Hybrid Deployments
What Exchange Administrators Need to Know About Hybrid DeploymentsWhat Exchange Administrators Need to Know About Hybrid Deployments
What Exchange Administrators Need to Know About Hybrid DeploymentsENow Software
 

Mehr von ENow Software (6)

Are you ready for Exchange 2016
Are you ready for Exchange 2016Are you ready for Exchange 2016
Are you ready for Exchange 2016
 
Identity Management Over the Horizon: What’s New and What’s Next
Identity Management Over the Horizon: What’s New and What’s NextIdentity Management Over the Horizon: What’s New and What’s Next
Identity Management Over the Horizon: What’s New and What’s Next
 
Lync & Skype Interop V2 Deep Dive - By Johan Delimon
Lync & Skype Interop  V2 Deep Dive - By Johan DelimonLync & Skype Interop  V2 Deep Dive - By Johan Delimon
Lync & Skype Interop V2 Deep Dive - By Johan Delimon
 
Troubleshooting Exchange Hybrid Deployments
Troubleshooting Exchange Hybrid DeploymentsTroubleshooting Exchange Hybrid Deployments
Troubleshooting Exchange Hybrid Deployments
 
Top 10 Tips for Supporting & Troubleshooting Lync 2013
Top 10 Tips for Supporting & Troubleshooting Lync 2013Top 10 Tips for Supporting & Troubleshooting Lync 2013
Top 10 Tips for Supporting & Troubleshooting Lync 2013
 
What Exchange Administrators Need to Know About Hybrid Deployments
What Exchange Administrators Need to Know About Hybrid DeploymentsWhat Exchange Administrators Need to Know About Hybrid Deployments
What Exchange Administrators Need to Know About Hybrid Deployments
 

KĂĽrzlich hochgeladen

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

KĂĽrzlich hochgeladen (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Auditing and Reporting for Office 365

  • 1. A W A R D W I N N I N G E X C H A N G E & O F F I C E 3 6 5 M A N A G E M E N T Auditing and Reporting for Office 365
  • 2. A W A R D W I N N I N G E X C H A N G E & O F F I C E 3 6 5 M A N A G E M E N T @enowconsulting Find us! ENow Software ENowSoftware ENowSoftware.com Some of ENow’s Loyal Customers • Microsoft Silver ISV & Messaging Microsoft Partner • Focused on building software solutions that simplify the life of IT administrators • Software architected by MVPs with >15 years experience in high-end Microsoft consulting and management • Customers in over 60 countries ENow Software About ENow
  • 3. A W A R D W I N N I N G E X C H A N G E & O F F I C E 3 6 5 M A N A G E M E N T
  • 4. A W A R D W I N N I N G E X C H A N G E & O F F I C E 3 6 5 M A N A G E M E N T About the speaker – Nathan O’Bryan MVP: Office Servers and Services MCSM: Messaging Consultant @ SPS http://www.spscom.com @MCSMLab http://www.mcsmlab.com
  • 5. A W A R D W I N N I N G E X C H A N G E & O F F I C E 3 6 5 M A N A G E M E N T Introduction • Auditing and reporting is important to any organization • Office 365 is a collection of different resources, all developed separately • Microsoft is working toward a unified auditing and reporting system, but they are not there yet
  • 6. A W A R D W I N N I N G E X C H A N G E & O F F I C E 3 6 5 M A N A G E M E N T Auditing and Reporting • In Office 365, auditing and reporting is broken into two groups • Exchange • Everything else • “Everything else” is far behind Exchange for auditing and reporting features • All auditing and reporting in Office 365 requires Exchange in your tenant • Microsoft is working on bringing “everything else” up to the auditing and reporting standards of Exchange
  • 7. A W A R D W I N N I N G E X C H A N G E & O F F I C E 3 6 5 M A N A G E M E N T Mailbox Auditing • Mailbox auditing is about figuring out who did what and when they did it • First introduced in Exchange 2007 SP2 • 3 types of mailbox auditing • Owner • Delegates • Administrator • Mailbox auditing is not on by default
  • 8. A W A R D W I N N I N G E X C H A N G E & O F F I C E 3 6 5 M A N A G E M E N T Demo 1 – Enable Mailbox Auditing • Verify mailbox auditing is on for a mailbox • Verify mailbox auditing is on for multiple mailboxes • Turn mailbox auditing on • Verify what actions are being audited
  • 9. A W A R D W I N N I N G E X C H A N G E & O F F I C E 3 6 5 M A N A G E M E N T Mailbox actions logged Action Description Admin Delegate Owner Copy An item is copied to another folder. Yes No No Create An item is created in the Calendar, Contacts, Notes, or Tasks folder in the mailbox; for example, a new meeting request is created. Note that message or folder creation isn't audited. Yes* Yes* Yes FolderBind A mailbox folder is accessed. Yes* Yes No HardDelete An item is deleted permanently from the Recoverable Items folder. Yes* Yes* Yes MailboxLogin The user signed in to their mailbox. No No Yes MessageBind An item is accessed in the reading pane or opened. Yes No No Move An item is moved to another folder. Yes* Yes Yes MoveToDeletedItems An item is moved to the Deleted Items folder. Yes* Yes Yes SendAs A message is sent using Send As permissions. Yes* Yes* No SendOnBehalf A message is sent using Send on Behalf permissions. Yes* Yes No SoftDelete An item is deleted from the Deleted Items folder. Yes* Yes* Yes Update An item's properties are updated. Yes* Yes* Yes * Audited by default if auditing is enabled for a mailbox.
  • 10. A W A R D W I N N I N G E X C H A N G E & O F F I C E 3 6 5 M A N A G E M E N T Demo 2 – Configuring Mailbox Auditing • Set what actions are audited • Set audit log age limit • Determine size of mailbox audit log • Delete mailbox audit log entries
  • 11. A W A R D W I N N I N G E X C H A N G E & O F F I C E 3 6 5 M A N A G E M E N T Demo 3 – Searching Mailbox Audit Log • Search mailbox audit log • Search for limited results • Search for specific actions on specific dates • Start mailbox audit log report • Search for external access • Show running audit log searches
  • 12. A W A R D W I N N I N G E X C H A N G E & O F F I C E 3 6 5 M A N A G E M E N T Auditing across Office 365 applications • Recently Microsoft has added more auditing and reporting around SharePoint Online and OneDrive • Office 365 compliance center • Search-UnifiedAuditLog • AzureActiveDirectory • AzureActiveDirectoryAccountLogon • ExchangeAdmin • ExchangeItem • ExchangeItemGroup • SharePoint • SharePointFileOperation
  • 13. A W A R D W I N N I N G E X C H A N G E & O F F I C E 3 6 5 M A N A G E M E N T Audit Storage Architecture
  • 14. A W A R D W I N N I N G E X C H A N G E & O F F I C E 3 6 5 M A N A G E M E N T Demo 4 – Search Unified Audit Log • Search unified audit log • Convert audit data from JSON format • Search for SharePoint file operations • Search for Azure AD operations • Search for Azure AD account login operations
  • 15. A W A R D W I N N I N G E X C H A N G E & O F F I C E 3 6 5 M A N A G E M E N T Reporting web service Office 365 Reporting web service reference page Office 365 reporting-related Windows PowerShell cmdlets CsActiveUser* reports Get-CsAVConferenceTimeReport CsAVConferenceTime* reports Get-CsActiveUserReport CsConference* reports Get-CsConferenceReport CsP2PAVTime* reports Get-CsP2PAVTimeReport CsP2PSession* reports Get-CsP2PSessionReport ConnectionbyClientType* reports Get-ConnectionByClientTypeReport ConnectionbyClientTypeDetail* reports Get-ConnectionByClientTypeDetailReport GroupActivity* reports Get-GroupActivityReport MailboxActivity* reports Get-MailboxActivityReport MailboxUsage report Get-MailboxUsageReport MailboxUsageDetail report Get-MailboxUsageDetailReport MailDetail report Get-MailDetailReport MailDetailDlpPolicy report Get-MailDetailDlpPolicyReport MailDetailMalware report Get-MailDetailMalwareReport MailDetailSpam report Get-MailDetailSpamReport MailDetailTransportRule report Get-MailDetailTransportRuleReport MailFilterList report Get-MailFilterListReport MailTraffic report Get-MailTrafficReport MailTrafficPolicy report Get-MailTrafficPolicyReport MailTrafficSummary reports Get-MailTrafficSummaryReport MailTrafficTop report Get-MailTrafficTopReport MessageTrace report Get-MessageTrace MessageTraceDetail report Get-MessageTraceDetail MxRecordReport report Get-MxRecordReport OutboundConnectorReport report Get-OutboundConnectorReport ServiceDeliveryReport report Get-ServiceDeliveryReport StaleMailbox report Get-StaleMailboxReport StaleMailboxDetail report Get-StaleMailboxDetailReport
  • 16. A W A R D W I N N I N G E X C H A N G E & O F F I C E 3 6 5 M A N A G E M E N T Demo 5 – Reporting Web Service • Mx record report • Outbound connector report • Mail traffic summary report • Stale mailbox detail report • Connection by client type report • Av conference time report
  • 17. A W A R D W I N N I N G E X C H A N G E & O F F I C E 3 6 5 M A N A G E M E N T Security & Compliance Center • Intended to be single portal for all Security & Compliance administration needs • Work in progress
  • 18. A W A R D W I N N I N G E X C H A N G E & O F F I C E 3 6 5 M A N A G E M E N T Demo 6 – Security & Compliance Center • Separate PowerShell connection • Available commands • Reports • Compliance Search
  • 19. A W A R D W I N N I N G E X C H A N G E & O F F I C E 3 6 5 M A N A G E M E N T Accessing GUI Mailbox Audit Reports • EAC > Compliance Management > Auditing • Office 365 Compliance Center
  • 20. A W A R D W I N N I N G E X C H A N G E & O F F I C E 3 6 5 M A N A G E M E N T Demo 7 – Office 365 GUI reports
  • 21. A W A R D W I N N I N G E X C H A N G E & O F F I C E 3 6 5 M A N A G E M E N T Summary • PowerShell is the best native way to get information out of Office 365 auditing and reporting • Office 365 canned reports are not currently very flexible • PowerShell reports may not be acceptable for management
  • 22. A W A R D W I N N I N G E X C H A N G E & O F F I C E 3 6 5 M A N A G E M E N T Q&A
  • 23. A W A R D W I N N I N G E X C H A N G E & O F F I C E 3 6 5 M A N A G E M E N T Thank You www.enowsoftware.com

Hinweis der Redaktion

  1. https://technet.microsoft.com/en-us/library/ff459237(v=exchg.160).aspx
  2. # DEMO 1 Get-Mailbox Nathan | Format-List Audit* Get-Mailbox | Format-Table Name, AuditEnabled -AutoSize Get-Mailbox | Where-Object {$_.AuditEnabled -Eq "True"} | Format-Table Name, AuditEnabled -AutoSize Get-Mailbox | Where-Object {$_.AuditEnabled -Ne "True"} | Format-Table Name, AuditEnabled -AutoSize Set-Mailbox –Identity Joe –AuditEnabled $True Get-Mailbox | Format-Table Name, AuditEnabled -AutoSize Get-Mailbox Nathan | Select -ExpandProperty AuditAdmin Get-Mailbox Nathan | Select -ExpandProperty AuditOwner Get-Mailbox Nathan | Select -ExpandProperty AuditDelegate # End DEMO 1
  3. https://technet.microsoft.com/en-us/library/ff459237(v=exchg.160).aspx#actions
  4. # DEMO 2 Set-Mailbox –Identity Joe -AuditAdmin None –AuditDelegate None -AuditOwner None Get-Mailbox Joe | Format-List Audit* Set-Mailbox -Identity Joe -AuditDelegate Create, FolderBind, HardDelete, Move, MoveToDeletedItems, SendAs, SendOnBehalf, SoftDelete, Update Set-Mailbox –Identity Joe –AuditEnabled $False Get-Mailbox Joe | Format-List Audit* Set-Mailbox Joe -AuditLogAgeLimit 24855.03:14:07 Get-Mailbox Joe | Format-List Audit* Get-MailboxFolderStatistics Nathan | Where-Object {$_.Name -eq "Audits"} | Format-Table Name, ItemsInFolder, FolderSize -AutoSize Set-Mailbox Joe -AuditLogAgeLimit 00:00:00 Start-ManagedFolderAssistant Joe Get-MailboxFolderStatistics Joe | Where-Object {$_.Name -eq "Audits"} | Format-Table Name, ItemsInFolder, FolderSize -AutoSize # End DEMO 2
  5. # DEMO 3 Search-MailboxAuditLog Nathan -ShowDetails Search-MailboxAuditLog Nathan -ShowDetails -ResultSize 10 | Format-Table Operation, OperationResult, LogonType, LastAccessed -AutoSize Search-MailboxAuditLog Nathan -ShowDetails -StartDate 04/10/2016 -EndDate 04/12/2016 | Where-Object {$_.Operation -Eq "MoveToDeletedItems" -Or $_.Operation -Eq "HardDelete" -Or $_.Operation -Eq "SoftDelete"-And $_.FolderPathName -Eq "\Inbox"} | Format-Table Operation, OperationResult, LogonType, LastAccessed, FolderPathName, SourceItemSubjectsList -AutoSize New-MailboxAuditLogSearch -Name "Demo Search Mailbox" -Mailboxes Nathan -ShowDetails -LogonTypes Delegate -StartDate 4/6/2016 -EndDate 4/7/2016 -StatusMailRecipients Nathan@MCSMLab.com Get-AuditLogSearch Get-AdminAuditLogConfig Search-AdminAuditLog -Cmdlets Set-* | Format-Table CmdletName, Caller, RunDate, Succeeded -AutoSize Search-AdminAuditLog –StartDate 04/01/2016 –EndDate 04/10/2016 –ExternalAccess $True | Out-GridView Search-AdminAuditLog –StartDate 04/01/2016 –EndDate 04/10/2016 –ExternalAccess $True | Sort CmdletName | Group CmdletName | Format-Table Count, Name New-AdminAuditLogSearch -Name "Demo Search Admin" -StartDate 1/1/2016 -EndDate 4/7/2016 -Cmdlets Set-Mailbox -Parameters UseDatabaseQuotaDefaults, ProhibitSendReceiveQuota -StatusMailRecipients Nathan@MCSMLab.com Get-AuditLogSearch # End DEMO 3
  6. # DEMO 4 Search-UnifiedAuditLog -StartDate 4/1/2016 -EndDate 4/10/2016 -RecordType SharePointFileOperation -ResultSize 1 $Output = Search-UnifiedAuditLog -StartDate 4/1/2016 -EndDate 4/10/2016 -RecordType SharePointFileOperation -ResultSize 1 $Results = ConvertFrom-Json -InputObject $Output.AuditData $Results Search-UnifiedAuditLog -StartDate 4/1/2016 -EndDate 4/10/2016 -RecordType SharePointFileOperation -ObjectIds "5-4 Auditing and Reporting for Office 365.pptx" | Where-Object {$_.Operations -Eq "FileModified"} | Format-Table UserIds, Operations, CreationDate -AutoSize Search-UnifiedAuditLog -StartDate 4/1/2016 -EndDate 4/10/2016 -RecordType AzureActiveDirectory | Format-Table CreationDate, Operations, UserIds -AutoSize Search-UnifiedAuditLog -StartDate 4/1/2016 -EndDate 4/10/2016 -RecordType AzureActiveDirectoryAccountLogon | Format-Table CreationDate, Operations, UserIds -AutoSize # End DEMO 4
  7. https://msdn.microsoft.com/en-us/library/office/jj984326.aspx
  8. # DEMO 5 Get-MxRecordReport -Domain mcsmlab.com Get-OutboundConnectorReport -Domain mcsmlab.com Get-MessageTrace -SenderAddress nathan@mcsmlab.com -StartDate 04/1/2016 -EndDate 04/6/2016 Get-MailTrafficSummaryReport -Category TopMailSender -StartDate 01/1/2016 -EndDate 01/30/2016 Get-MailTrafficSummaryReport -Category TopSpamRecipient -StartDate 01/1/2016 -EndDate 01/30/2016 Get-StaleMailboxDetailReport Get-ConnectionByClientTypeDetailReport -StartDate 04/1/2016 -EndDate 04/10/2016 Get-CsConferenceReport -ReportType Monthly -StartDate 01/01/2016 -EndDate 01/31/2016 Get-CsAVConferenceTimeReport -ReportType Monthly -StartDate 01/01/2016 -EndDate 01/31/2016 # End DEMO 5
  9. # Connect SCC PS [CmdLetBinding()]param([Parameter(Position=0,Mandatory=$false)][Switch]$ProxyEnabled) if($ProxyEnabled){$Session = New-Pssession -ConfigurationName Microsoft.Exchange -ConnectionUri https://ps.compliance.protection.outlook.com/powershell-liveid/ -Credential (Get-Credential) -Authentication Basic -AllowRedirection -sessionOption (New-PsSessionOption -ProxyAccessType IEConfig -ProxyAuthentication basic)} else{$Session = New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri https://ps.compliance.protection.outlook.com/powershell-liveid/ -Authentication Basic -AllowRedirection -Credential (get-credential)} Import-PSSession $session –AllowClobber -DisableNameChecking #Demo 6 Get-Command -Module tmp_vjigxxwl.faa Get-DeviceConfigurationPolicy | Format-Table Name, CreatedBy, DistributionStatusget-mail Get-HoldCompliancePolicy Get-eDiscoveryCaseAdmin Get-ComplianceSearch | Format-Table Get-ComplianceSearch -Identity "Test Search" | Format-Table Name, CreatedTime, Items, Size Get-ComplianceSearch -Identity "Specific Job" | Format-Table Name, CreatedTime, Items, Size New-ComplianceSearchAction -SearchName "Specific Job" -Purge -PurgeType SoftDelete Get-ComplianceSearchAction | Format-Table SearchName, JobStartTime, JobProgress, Status