You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-monitor/insights/solution-office-365.md
+19-19Lines changed: 19 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ ms.subservice:
5
5
ms.topic: conceptual
6
6
author: bwren
7
7
ms.author: bwren
8
-
ms.date: 01/08/2019
8
+
ms.date: 03/30/2020
9
9
10
10
---
11
11
@@ -16,7 +16,7 @@ ms.date: 01/08/2019
16
16
17
17
> [!IMPORTANT]
18
18
> ## Solution update
19
-
> This solution has been replaced by the [Office 365](../../sentinel/connect-office-365.md) General Availability solution in [Azure Sentinel](../../sentinel/overview.md) and the [Azure AD reporting and monitoring solution](../../active-directory/reports-monitoring/plan-monitoring-and-reporting.md). Together they provide an updated version of the previous Azure Monitor Office 365 solution with an improved configuration experience. You can continue to use the existing solution until April 30, 2020.
19
+
> This solution has been replaced by the [Office 365](../../sentinel/connect-office-365.md) General Availability solution in [Azure Sentinel](../../sentinel/overview.md) and the [Azure AD reporting and monitoring solution](../../active-directory/reports-monitoring/plan-monitoring-and-reporting.md). Together they provide an updated version of the previous Azure Monitor Office 365 solution with an improved configuration experience. You can continue to use the existing solution until July 30, 2020.
20
20
>
21
21
> Azure Sentinel is a cloud native Security Information and Event Management solution that ingests logs and provides additional SIEM functionality including detections, investigations, hunting and machine learning driven insights. Using Azure Sentinel will now provide you with ingestion of Office 365 SharePoint activity and Exchange management logs.
22
22
>
@@ -49,7 +49,7 @@ ms.date: 01/08/2019
49
49
> | where TimeGenerated >= ago(1d)
50
50
> | where OfficeWorkload == "AzureActiveDirectory"
51
51
> | where Operation == 'UserLoginFailed'
52
-
> | summarize count() by UserId
52
+
> | summarize count() by UserId
53
53
> ```
54
54
>
55
55
> ```Kusto
@@ -78,10 +78,10 @@ ms.date: 01/08/2019
78
78
> ### Q: Do I need Azure Sentinel to connect the Azure AD logs?
79
79
> You can configure [Azure AD logs integration with Azure Monitor](../../active-directory/reports-monitoring/howto-integrate-activity-logs-with-log-analytics.md), which is not related to the Azure Sentinel solution. Azure Sentinel provides a native connector and out-of-the box content for Azure AD logs. For more information, see the question below on out-of-the-box security-oriented content.
80
80
>
81
-
> ###Q: What are the differences when connecting Azure AD logs from Azure Sentinel and Azure Monitor?
81
+
> ###Q: What are the differences when connecting Azure AD logs from Azure Sentinel and Azure Monitor?
82
82
> Azure Sentinel and Azure Monitor connect to Azure AD logs based on the same [Azure AD reporting and monitoring solution](../../active-directory/reports-monitoring/plan-monitoring-and-reporting.md). Azure Sentinel provides a one-click, native connector that connects the same data and provides monitoring information.
83
83
>
84
-
> ###Q: What do I need to change when moving to the new Azure AD reporting and monitoring tables?
84
+
> ###Q: What do I need to change when moving to the new Azure AD reporting and monitoring tables?
85
85
> All queries using Azure AD data, including queries in alerts, dashboards, and any content that you created using Office 365 Azure AD data, must be recreated using the new tables.
86
86
>
87
87
> Azure Sentinel and Azure AD provide built-in content that you can use when moving to the Azure AD reporting and monitoring solution. For more information, see the next question on out-of-the-box security-oriented content and [How to use Azure Monitor workbooks for Azure Active Directory reports](../../active-directory/reports-monitoring/howto-use-azure-monitor-workbooks.md).
@@ -99,11 +99,11 @@ ms.date: 01/08/2019
99
99
> ### Q: Does Azure Sentinel provide additional connectors as part of the solution?
100
100
> Yes, see [Azure Sentinel connect data sources](../../sentinel/connect-data-sources.md).
101
101
>
102
-
> ###Q: What will happen on April 30? Do I need to offboard beforehand?
102
+
> ###Q: What will happen on April 30? Do I need to offboard beforehand?
103
103
>
104
-
> - You won’t be able to receive data from the **Office365** solution. The solution will no longer be available in the Marketplace
104
+
> - You won't be able to receive data from the **Office365** solution. The solution will no longer be available in the Marketplace
105
105
> - For Azure Sentinel customers, the Log Analytics workspace solution **Office365** will be included in the Azure Sentinel **SecurityInsights** solution.
106
-
> - If you don’t offboard your solution manually, your data will be disconnected automatically on April 30.
106
+
> - If you don't offboard your solution manually, your data will be disconnected automatically on April 30.
107
107
>
108
108
> ### Q: Will my data transfer to the new solution?
109
109
> Yes. When you remove the **Office 365** solution from your workspace, its data will become temporarily unavailable because the schema is removed. When you enable the new **Office 365** connector in Sentinel, the schema is restored to the workspace and any data already collected will become available.
@@ -244,7 +244,7 @@ The dashboard includes the columns in the following table. Each column lists the
244
244
|:--|:--|
245
245
| Operations | Provides information about the active users from your all monitored Office 365 subscriptions. You will also be able to see the number of activities that happen over time.
246
246
| Exchange | Shows the breakdown of Exchange Server activities such as Add-Mailbox Permission, or Set-Mailbox. |
247
-
| SharePoint | Shows the top activities that users perform on SharePoint documents. When you drill down from this tile, the search page shows the details of these activities, such as the target document and the location of this activity. For example, for a File Accessed event, you will be able to see the document that’s being accessed, its associated account name, and IP address. |
247
+
| SharePoint | Shows the top activities that users perform on SharePoint documents. When you drill down from this tile, the search page shows the details of these activities, such as the target document and the location of this activity. For example, for a File Accessed event, you will be able to see the document that's being accessed, its associated account name, and IP address. |
248
248
| Azure Active Directory | Includes top user activities, such as Reset User Password and Login Attempts. When you drill down, you will be able to see the details of these activities like the Result Status. This is mostly helpful if you want to monitor suspicious activities on your Azure Active Directory. |
249
249
250
250
@@ -311,7 +311,7 @@ These records are created when change or additions are made to Azure Active Dire
311
311
| ActorContextId | The GUID of the organization that the actor belongs to. |
312
312
| ActorIpAddress | The actor's IP address in IPV4 or IPV6 address format. |
313
313
| InterSystemsId | The GUID that track the actions across components within the Office 365 service. |
314
-
| IntraSystemId | The GUID that's generated by Azure Active Directory to track the action. |
314
+
| IntraSystemId | The GUID that's generated by Azure Active Directory to track the action. |
315
315
| SupportTicketId | The customer support ticket ID for the action in "act-on-behalf-of" situations. |
316
316
| TargetContextId | The GUID of the organization that the targeted user belongs to. |
317
317
@@ -326,7 +326,7 @@ These records are created from Data Center Security audit data.
326
326
| ElevationApprovedTime | The timestamp for when the elevation was approved. |
327
327
| ElevationApprover | The name of a Microsoft manager. |
328
328
| ElevationDuration | The duration for which the elevation was active. |
329
-
| ElevationRequestId | A unique identifier for the elevation request. |
329
+
| ElevationRequestId | A unique identifier for the elevation request. |
330
330
| ElevationRole | The role the elevation was requested for. |
331
331
| ElevationTime | The start time of the elevation. |
332
332
| Start_Time | The start time of the cmdlet execution. |
@@ -340,8 +340,8 @@ These records are created when changes are made to Exchange configuration.
340
340
|:--- |:--- |
341
341
| OfficeWorkload | Exchange |
342
342
| RecordType | ExchangeAdmin |
343
-
| ExternalAccess | Specifies whether the cmdlet was run by a user in your organization, by Microsoft datacenter personnel or a datacenter service account, or by a delegated administrator. The value False indicates that the cmdlet was run by someone in your organization. The value True indicates that the cmdlet was run by datacenter personnel, a datacenter service account, or a delegated administrator. |
344
-
| ModifiedObjectResolvedName | This is the user friendly name of the object that was modified by the cmdlet. This is logged only if the cmdlet modifies the object. |
343
+
| ExternalAccess | Specifies whether the cmdlet was run by a user in your organization, by Microsoft datacenter personnel or a datacenter service account, or by a delegated administrator. The value False indicates that the cmdlet was run by someone in your organization. The value True indicates that the cmdlet was run by datacenter personnel, a datacenter service account, or a delegated administrator. |
344
+
| ModifiedObjectResolvedName | This is the user friendly name of the object that was modified by the cmdlet. This is logged only if the cmdlet modifies the object. |
345
345
| OrganizationName | The name of the tenant. |
346
346
| OriginatingServer | The name of the server from which the cmdlet was executed. |
347
347
| Parameters | The name and value for all parameters that were used with the cmdlet that is identified in the Operations property. |
@@ -362,7 +362,7 @@ These records are created when changes or additions are made to Exchange mailbox
362
362
| ClientVersion | The version of the email client . |
363
363
| InternalLogonType | Reserved for internal use. |
364
364
| Logon_Type | Indicates the type of user who accessed the mailbox and performed the operation that was logged. |
365
-
| LogonUserDisplayName | The user-friendly name of the user who performed the operation. |
365
+
| LogonUserDisplayName | The user-friendly name of the user who performed the operation. |
366
366
| LogonUserSid | The SID of the user who performed the operation. |
367
367
| MailboxGuid | The Exchange GUID of the mailbox that was accessed. |
@@ -401,7 +401,7 @@ These records are created when changes or additions are made to Exchange groups.
401
401
| DestMailboxOwnerUPN | Set only if the CrossMailboxOperations parameter is True. Specifies the UPN of the owner of the target mailbox. |
402
402
| DestFolder | The destination folder, for operations such as Move. |
403
403
| Folder | The folder where a group of items is located. |
404
-
| Folders | Information about the source folders involved in an operation; for example, if folders are selected and then deleted. |
404
+
| Folders | Information about the source folders involved in an operation; for example, if folders are selected and then deleted. |
405
405
406
406
407
407
### SharePoint Base
@@ -415,7 +415,7 @@ These properties are common to all SharePoint records.
415
415
| EventSource | Identifies that an event occurred in SharePoint. Possible values are SharePoint or ObjectModel. |
416
416
| ItemType | The type of object that was accessed or modified. See the ItemType table for details on the types of objects. |
417
417
| MachineDomainInfo | Information about device sync operations. This information is reported only if it's present in the request. |
418
-
| MachineId | Information about device sync operations. This information is reported only if it's present in the request. |
418
+
| MachineId | Information about device sync operations. This information is reported only if it's present in the request. |
419
419
| Site_ | The GUID of the site where the file or folder accessed by the user is located. |
420
420
| Source_Name | The entity that triggered the audited operation. Possible values are SharePoint or ObjectModel. |
421
421
| UserAgent | Information about the user's client or browser. This information is provided by the client or browser. |
@@ -430,7 +430,7 @@ These records are created when configuration changes are made to SharePoint.
430
430
| OfficeWorkload | SharePoint |
431
431
| OfficeWorkload | SharePoint |
432
432
| CustomEvent | Optional string for custom events. |
433
-
| Event_Data | Optional payload for custom events. |
433
+
| Event_Data | Optional payload for custom events. |
434
434
| ModifiedProperties | The property is included for admin events, such as adding a user as a member of a site or a site collection admin group. The property includes the name of the property that was modified (for example, the Site Admin group), the new value of the modified property (such the user who was added as a site admin), and the previous value of the modified object. |
435
435
436
436
@@ -448,9 +448,9 @@ These records are created in response to file operations in SharePoint.
448
448
| SharingType | The type of sharing permissions that were assigned to the user that the resource was shared with. This user is identified by the UserSharedWith parameter. |
449
449
| Site_Url | The URL of the site where the file or folder accessed by the user is located. |
450
450
| SourceFileExtension | The file extension of the file that was accessed by the user. This property is blank if the object that was accessed is a folder. |
451
-
| SourceFileName | The name of the file or folder accessed by the user. |
451
+
| SourceFileName | The name of the file or folder accessed by the user. |
452
452
| SourceRelativeUrl | The URL of the folder that contains the file accessed by the user. The combination of the values for the SiteURL, SourceRelativeURL, and SourceFileName parameters is the same as the value for the ObjectID property, which is the full path name for the file accessed by the user. |
453
-
| UserSharedWith | The user that a resource was shared with. |
453
+
| UserSharedWith | The user that a resource was shared with. |
0 commit comments