Follow

Detect for O365: Investigating Azure AD and O365 Detection Outside of Vectra

Detect for O365 is able to identify attacker behaviors related to Azure AD federated applications, the Azure AD backend, and deep O365 functionality. 

 

Analysts looking to perform a deeper investigation into a Vectra O365 or Azure AD alert can leverage Microsoft's native audit log's search. This tool allows for analysts to review the events that caused Vectra to trigger and any events before or after the identified behavior.  


Users can access the Audit Log search from the compliance section of the Microsoft console with their Microsoft credentials.  Note that access to this functionality may require additional permission that can be granted by an Azure AD admin. 

 

https://compliance.microsoft.com/auditlogsearch?viewid=SearchScreen_Shot_2021-02-24_at_11.07.18_AM.png

 

Method 2: 

https://protection.office.com/ 

In the left pane of the Security & Compliance Center, click Search, and then click Audit log search.

The Audit log search page is displayed.

Configure criteria and then click Search to run report

Was this article helpful?
0 out of 0 found this helpful

Download PDF

Have more questions? Submit a request

0 Comments

Article is closed for comments.