Search Tutorials


SC-401 Purview Audit and Alerts | JavaInUse

SC-401 - Audit and Alerts

Audit Overview

Microsoft Purview Audit provides a unified audit log that captures user and admin activities across Microsoft 365 services. It enables security investigations, compliance reporting, and forensic analysis of what happened, when, and by whom in your Microsoft 365 environment.

Audit log captures activities across:

  • Exchange Online (email access, mailbox changes, admin operations)
  • SharePoint Online and OneDrive (file access, sharing, permissions changes)
  • Microsoft Teams (channel messages, meeting creation, app additions)
  • Azure Active Directory / Microsoft Entra ID (sign-ins, role changes, app registrations)
  • Microsoft 365 Defender portal (alert actions, policy changes)
  • Microsoft Purview (DLP matches, label activities, eDiscovery actions)
  • Power BI, Power Platform, Dynamics 365
Auditing must be enabled for your tenant. In most cases it is on by default, but verify by checking the Audit page in the Purview compliance portal. Once enabled, auditing begins collecting records for newly performed activities - it is not retroactive. There is typically a 30-60 minute delay before activities appear in the audit log search results.

Audit (Standard)

Audit (Standard) is the base tier available with Microsoft 365 E3/Business Premium and above.

AttributeAudit (Standard)
LicenseIncluded with Microsoft 365 E3, Business Premium, standalone Exchange Online Plan 2
Default retention180 days (updated from 90 days; applies to E3 and higher)
Events loggedThousands of activity types across Microsoft 365 services
Search interfacePurview compliance portal - Audit search
ExportCSV export of up to 50,000 records per search
API accessOffice 365 Management Activity API

Key Standard activities available: FileAccessed, FileModified, FileMoved, FileShared, FileDeleted, Sent (Exchange), MailboxLogin, UserLoggedIn, AddMember (Groups), and hundreds more.

Audit (Premium)

Audit (Premium) extends Standard with additional high-value events, longer retention, and custom retention policies for forensic investigations.

AttributeAudit (Premium)
LicenseMicrosoft 365 E5 or Compliance add-on (E5 Compliance or M365 E3 + Compliance add-on)
Default retention1 year (365 days) for all audited activities
Extended retentionUp to 10 years with the 10-Year Audit Log Retention add-on (per-user license required)
Premium eventsMailItemsAccessed, Send, SearchQueryInitiatedExchange, SearchQueryInitiatedSharePoint, and more
Custom retention policiesTarget specific workloads, record types, and users with custom retention durations
Intelligent insightsAccess to high-bandwidth audit data for SIEM and advanced threat hunting via API

Key Audit (Premium) Events

EventDescriptionInvestigation Value
MailItemsAccessedLogged every time a mail item is accessed via a mail protocol or clientDetermine which emails a compromised account read
SendLogged when a message is sent (standard Send activity exists too; Premium version has richer metadata)Full recipient list and timing for sent messages during investigation
SearchQueryInitiatedExchangeLogged when user performs a search in Outlook or Exchange web appUnderstand what a threat actor searched for in a compromised mailbox
SearchQueryInitiatedSharePointLogged when user performs a SharePoint searchUnderstand what sensitive content a risky user searched for
ApiFetchDataGraph API data access by third-party appsDetect over-privileged apps accessing sensitive org data
MailItemsAccessed is the most exam-tested Audit (Premium) event. It enables forensic reconstruction of exactly which emails a threat actor accessed during a breach. Before Audit Premium, investigators could only tell that a mailbox was signed into (MailboxLogin) - but not which specific emails were read. MailItemsAccessed closes this investigative gap.

Audit Log Retention Policies

Audit (Premium) allows creating custom audit log retention policies to retain specific audit records for longer than the default period, or to retain records for specific workloads, users, or activity types.

Retention Policy Configuration

SettingOptions
Record typeTarget specific workloads (Exchange, SharePoint, AzureAD, Teams, etc.) or all record types
ActivityTarget specific activities within the workload (e.g., only MailItemsAccessed) or all activities
UsersApply to all users or specific users
Retention duration3 months, 6 months, 1 year, 3 years, 5 years, or 10 years (10-year requires add-on license)
PriorityLower number = higher priority when multiple policies match the same record

Default Policy Behavior

Audit (Premium) includes a built-in default retention policy covering all activities for Premium-licensed users:

  • Users with E5 or Compliance add-on: 1-year default retention
  • Users with only E3: 180-day retention (Standard tier)
  • Custom policies override the default for matching records

DLP Alerts

DLP policies can be configured to generate alerts when policy rules are matched, enabling active monitoring and incident response for data protection violations.

DLP Alert Configuration

Within each DLP policy rule, configure incident reports and alerts:

  • Alert every time a rule matches: Generates individual alerts for each match event (can create high volume for active policies)
  • Aggregate events into a single alert: Groups multiple matches within a time window into one alert (reduces alert fatigue)
  • Alert threshold: Set minimum activity count before alert triggers
  • Severity level: Low, Medium, High - used for prioritization in alert dashboards
  • Email notifications: Send incident reports to specified email addresses when rule matches

DLP Alerts Dashboard

The DLP Alerts dashboard in the Purview compliance portal shows all DLP alert events with:

  • Alert severity and status (Active, Investigating, Resolved, Dismissed)
  • Activity details: which rule matched, user, file/message details, timestamp
  • Evidence details: matched content with highlighted sensitive information
  • User activity history: other recent DLP matches for the same user
  • Case creation: ability to create an eDiscovery case directly from the DLP alert for further investigation
DLP alerts can also be surfaced in Microsoft Defender XDR (formerly Microsoft 365 Defender) portal as incidents, enabling SOC teams to investigate DLP incidents alongside security alerts in a single pane. This integration requires connecting Purview DLP alerts to Defender XDR in the Defender settings.

Defender XDR Alerts

Microsoft Defender XDR (Extended Detection and Response) consolidates security alerts from multiple Microsoft security products into unified incidents. For SC-401, key alert types include:

Alert SourceRelevant Alert Types
Microsoft Purview DLPDLP policy match alerts: sensitive data sharing, mass download, external exposure of labeled content
Defender for Cloud AppsImpossible travel, mass download, file shared with too many users, ransomware activity
Defender for EndpointPossible sensitive data exfiltration, USB device usage, anomalous file access
Defender for IdentityCredential theft, lateral movement, privileged account activities
Entra ID ProtectionRisky sign-in, leaked credentials, anonymous IP sign-in

Investigating Data-Related Incidents in Defender XDR

When a DLP alert or MDCA data alert becomes a Defender XDR incident:

  1. The incident appears in Defender XDR Incidents queue with affected users, assets, and evidence
  2. Related alerts from other products (e.g., Entra risky sign-in + DLP violation by same user) are automatically correlated
  3. Advanced Hunting (KQL queries) can correlate audit events, DLP events, and endpoint signals for deep investigation
  4. Automated investigation and response (AIR) may suggest or automatically take remediation actions
For SC-401, understand the relationship between Purview compliance alerts (DLP Alerts dashboard) and Defender XDR. Compliance teams primarily work in the Purview portal; security teams work in Defender XDR. Both views of the same data - Defender XDR provides broader security context (correlating DLP with sign-in anomalies), while Purview provides deeper compliance context (matched content, policy details).

Content Search and eDiscovery

Content Search and eDiscovery tools allow searching across Microsoft 365 content for legal holds, investigations, and regulatory requests.

Tool Comparison

ToolStructureCapabilitiesLicense
Content SearchStandalone search, no case structureSearch Exchange, SharePoint, OD, Teams; preview; exportE3 and above
eDiscovery (Standard)Case-based organization; holdsContent Search + legal hold management + case access controlE3 and above
eDiscovery (Premium)Full case management with custodiansStandard + custodian management, review sets, advanced analytics (near-duplicate, threading, themes, predictive coding)E5 or Compliance add-on

KQL in Content Search

Content Search supports Keyword Query Language (KQL) for precise targeting:

  • subject:"Project X" - search by email subject
  • from:user@company.com - search by sender
  • sent:2023-01-01..2024-01-01 - date range filter
  • kind:email AND confidential - content type plus keyword
  • SensitivityLabel:"Highly Confidential" - search by sensitivity label
eDiscovery (Premium) review sets are a staged collection feature that imports search results into an isolated workspace for legal review. Items in review sets are de-duplicated, near-duplicates are clustered, email threads are reconstructed, and predictive coding (relevance ML model) can be trained to prioritize the most relevant documents. This significantly reduces the volume of documents that human reviewers must examine.

Popular Posts

��