Explore Microsoft Purview Audit (Premium)

Completed

The Audit functionality in Microsoft Purview provides organizations with visibility into many types of audited activities across many different Microsoft 365 services. Microsoft Purview provides two auditing solutions: Audit (Standard) and Audit (Premium).

In a previous module, you learned that Microsoft Purview Audit (Standard) provides organizations with the ability to log and search for audited activities. It also enables an organization to power its forensic, IT, compliance, and legal investigations.

In this module, you'll learn that Microsoft Purview Audit (Premium) builds on the capabilities of Microsoft Purview Audit (Standard). It provides advanced features designed specifically for organizations that conduct forensic and compliance investigations. These features provide:

  • Increased audit log retention required to conduct an investigation.
  • Access to crucial events that help determine scope of compromise.
  • Higher bandwidth access, and thus, faster access to Office 365 Management Activity API.

This unit provides an overview of Audit (Premium) capabilities.

Organization subscription and user licensing

Audit (Premium) is available for organizations with an Office 365 E5/A5/G5 or Microsoft 365 Enterprise E5/A5/G5 subscription. For organizations with an E5/A5/G5 subscription, eligible customers and users who are assigned the appropriate E5/A5/G5 license will have access to Audit (Premium) events. Audit (Premium) events will only be generated for users with E5/A5/G5 licenses once those licenses have been assigned.

To benefit from user-level Audit (Premium) capabilities, a user must be assigned an E5/A5/G5 license. There are some capabilities that will check for the appropriate license to expose the feature for the user. For example, if you're trying to retain the audit records for a user who isn't assigned the appropriate license for longer than 90 days, the system will return an error message.

Long-term retention of audit logs

When an audited activity is performed by a user or admin, an audit record is generated and stored in the audit log for the organization. In Microsoft Purview Audit (Standard), audit log records are retained for 90 days. In comparison, Audit (Premium) retains all Exchange, SharePoint, and Microsoft Entra audit records for one year.

Audit (Premium) provides this extra retention time by implementing a default audit log retention policy. Retaining audit records for longer periods can help with on-going forensic or compliance investigations. For more information, see the "Default audit log retention policy" section in Manage audit log retention policies.

Note

In addition to the one-year retention capabilities of Audit (Premium), Microsoft 365 can optionally retain audit logs for 10 years. The 10-year retention of audit logs helps support long running investigations and respond to regulatory, legal, and internal obligations. Retaining audit logs for 10 years requires an extra per-user add-on license. After this license is assigned to a user and an appropriate 10-year audit log retention policy is set for that user, audit logs covered by that policy will start to be retained for the 10-year period. This policy isn't retroactive. As such, it can't retain audit logs that were generated before the 10-year audit log retention policy was created.

Audit log retention policies

All audit records generated in other services that aren't covered by the default audit log retention policy are retained for 90 days. But you can create customized audit log retention policies to retain other audit records for up to 10 years. You can create a policy to retain audit records based on one or more of the following criteria:

  • The Microsoft 365 service where the audited activities occur.
  • Specific audited activities.
  • The user who performs an audited activity.

You can also specify how long to retain audit records that match the policy and a priority level. This design enables specific policies to take priority over other policies.

Any custom audit log retention policy takes precedence over the default audit retention policy in case you must retain Exchange, SharePoint, or Microsoft Entra audit records for less than a year (or up to 10 years) for some or all users in your organization.

Caution

Any audit log data covered by a 10-year audit log retention policy that you created after the feature was released to general availability in the last quarter of 2020 will be retained for 10 years. This design includes 10-year audit log retention policies that were created before the required add-on license was released for purchase in March 2021. However, because the 10-Year Audit Log Retention Add On license is now available, you must purchase and assign those add-on licenses for all users whose audit data is covered by a 10-year audit retention policy.

Audit (Premium) events

Audit (Premium) helps organizations conduct forensic and compliance investigations by providing access to important events, such as:

  • when mail items were accessed.
  • when mail items were replied to and forwarded.
  • when and what a user searched for in Exchange Online and SharePoint Online.

These events can help you investigate possible breaches and determine the scope of compromise. Along with these events in Exchange and SharePoint, there are events in other Microsoft 365 services that are also considered important events. These events also require that users are assigned the appropriate Audit (Premium) license.

Important

Users must be assigned an Audit (Premium) license so that audit logs will be generated when users perform these events.

Audit (Premium) provides the following new events, each of which is introduced in the following sections:

  • MailItemsAccessed event
  • Send event
  • SearchQueryInitiatedExchange event
  • SearchQueryInitiatedSharePoint event
  • Other Audit (Premium) events in Microsoft 365

Note

These new events in Audit (Premium) events are available in the Office 365 Management Activity API. As long as audit records are generated for users with the appropriate license, you'll be able to access these records through the Office 365 Management Activity API.

MailItemsAccessed event

The MailItemsAccessed event is a mailbox auditing action. It's triggered when mail data is accessed by mail protocols and mail clients. This event can help investigators identify data breaches and determine the scope of messages that may have been compromised. If an attacker gained access to email messages, the MailItemsAccessed action will be triggered even if there's no explicit signal that messages were read. In other words, the type of access such as a bind or sync is recorded in the audit record.

The MailItemsAccessed event replaces MessageBind in mailbox auditing logging in Exchange Online. It provides the following improvements:

  • MessageBind was only configurable for the AuditAdmin user sign-in type. It didn't apply to delegate or owner actions.
    • Improvement. MailItemsAccessed applies to all sign-in types.
  • MessageBind only covered access by a mail client. It didn't apply to sync activities.
    • Improvement. MailItemsAccessed events are triggered by both bind and sync access types.
  • MessageBind actions would trigger the creation of multiple audit records when the same email message was accessed. This design resulted in auditing "noise".
    • Improvement. MailItemsAccessed events are aggregated into fewer audit records.

To search for MailItemsAccessed audit records, organizations can search for the Accessed mailbox items activity in the Exchange mailbox activities drop-down list in the audit log search tool in the Microsoft Purview compliance portal.

Screenshot of the Search window with the Accessed mailbox items option selected for the Activities setting.

You can also run the Search-UnifiedAuditLog -Operations MailItemsAccessed or Search-MailboxAuditLog -Operations MailItemsAccessed commands in Exchange Online PowerShell.

Send event

The Send event is another mailbox auditing action. It's triggered when a user completes one of the following actions:

  • Sends an email message.
  • Replies to an email message.
  • Forwards an email message.

Investigators can use the Send event to identify email sent from a compromised account. The audit record for a Send event contains information about the message, such as:

  • when the message was sent.
  • the InternetMessage ID.
  • the subject line.
  • whether the message contained attachments.

This auditing information can help investigators identify information about email messages sent from a compromised account or sent by an attacker. Additionally, investigators can use a Microsoft 365 eDiscovery tool to search for the message (by using the subject line or message ID). By doing so, they can identify the recipients the message was sent to and the actual contents of the sent message.

To search for Send audit records, you can search for the Sent message activity in the Exchange mailbox activities drop-down list in the audit log search tool in the Microsoft Purview compliance portal.

Screenshot of the Search window with the Sent message option selected for the Activities setting.

You can also run the Search-UnifiedAuditLog -Operations Send or Search-MailboxAuditLog -Operations Send commands in Exchange Online PowerShell.

SearchQueryInitiatedExchange event

The SearchQueryInitiatedExchange event is triggered when a person uses Outlook to search for items in a mailbox. Events are triggered when searches are performed in the following Outlook environments:

  • Outlook (desktop client)
  • Outlook on the web (OWA)
  • Outlook for iOS
  • Outlook for Android
  • Mail app for Windows 10

Investigators can use the SearchQueryInitiatedExchange event to determine if an attacker (who may have compromised an account) looked for or tried to access sensitive information in the mailbox. The audit record for a SearchQueryInitiatedExchange event contains information such as the actual text of the search query. The audit record also indicates the Outlook environment the search was performed in. By looking at the search queries that an attacker may have performed, an investigator can better understand the intent of the email data that was searched for.

To search for SearchQueryInitiatedExchange audit records, you can search for the Performed email search activity in the Search activities drop-down list in the audit log search tool in the Microsoft Purview compliance portal.

Screenshot of the Search window with the Performed email search option selected for the Activities setting.

You can also run the Search-UnifiedAuditLog -Operations SearchQueryInitiatedExchange in Exchange Online PowerShell.

You must enable SearchQueryInitiatedExchange to be logged so you can search for this event in the audit log.

SearchQueryInitiatedSharePoint event

The SearchQueryInitiatedSharePoint event is similar to searching for mailbox items. It's triggered when a person searches for items in SharePoint. Events are triggered when searches are performed on the root or default page of the following types of SharePoint sites:

  • Home sites
  • Communication sites
  • Hub sites
  • Sites associated with Microsoft Teams

Investigators can use the SearchQueryInitiatedSharePoint event to determine if an attacker tried to find (and possibly accessed) sensitive information in SharePoint. The audit record for a SearchQueryInitiatedSharePoint event contains the actual text of the search query. The audit record also indicates the type of SharePoint site that was searched. By looking at the search queries that an attacker may have run, an investigator can better understand the intent and scope of the file data the attacker searched for.

To search for SearchQueryInitiatedSharePoint audit records, you can search for the Performed SharePoint search activity in the Search activities drop-down list in the audit log search tool in the Microsoft Purview compliance portal.

Screenshot of the Search window with the Performed SharePoint search option selected for the Activities setting.

You can also run the Search-UnifiedAuditLog -Operations SearchQueryInitiatedSharePoint in Exchange Online PowerShell.

Note

You must enable SearchQueryInitiatedSharePoint to be logged so you can search for this event in the audit log.

Other Audit (Premium) events in Microsoft 365

Besides the events in Exchange Online and SharePoint Online, there are events in other Microsoft 365 services that are logged when users are assigned the appropriate Audit (Premium) licensing. The following Microsoft 365 services provide Audit (Premium) events. Select the corresponding link to go to an article that identifies and describes these events.

High-bandwidth access to the Office 365 Management Activity API

Organizations that previously access auditing logs through the Office 365 Management Activity API were restricted by throttling limits at the publisher level. As a result, for publishers who pulled data on behalf of multiple customers, the limit was shared by all those customers.

With the release of Audit (Premium), Microsoft 365 has moved from a publisher-level limit to a tenant-level limit. The result is that each organization will get their own fully allocated bandwidth quota to access their auditing data. The bandwidth isn't a static, predefined limit. Instead, it's modeled on a combination of factors. These factors include the number of seats in the organization, and the fact that E5/A5/G5 organizations will get more bandwidth than non-E5/A5/G5 organizations.

All organizations are initially allocated a baseline of 2,000 requests per minute. This limit will dynamically increase depending on an organization's seat count and their licensing subscription. E5/A5/G5 organizations will get about twice as much bandwidth as non-E5/A5/G5 organizations. There will also be a cap on the maximum bandwidth to protect the health of the service.

Additional reading. For more information, see the "API throttling" section in Office 365 Management Activity API reference.

Knowledge check

Choose the best response for the following question.

Check your knowledge

1.

Fabrikam has implemented Microsoft Purview Audit (Premium). It now wants to create appropriate 10-year audit log retention policies for the managers of its security and compliance teams. What must Fabrikam do to enable this functionality?