Skip to content

Commit b932962

Browse files
authored
Merge pull request #2437 from MicrosoftDocs/diannegali-updateaudit
updated auditing feature
2 parents 2430b4c + c10332d commit b932962

File tree

2 files changed

+24
-32
lines changed

2 files changed

+24
-32
lines changed

defender-xdr/auditing.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.custom:
1717
- cx-ti
1818
- cx-dex
1919
search.appverid: met150
20-
ms.date: 10/30/2024
20+
ms.date: 01/14/2025
2121
---
2222

2323
# Auditing
@@ -28,7 +28,7 @@ ms.date: 10/30/2024
2828

2929
As a tenant administrator, you can use Microsoft Purview to search the audit logs for the times Microsoft Defender Experts signed into your tenant and the actions they did there to perform their investigations. You can also search the audit logs for the changes done by your tenant administrators to the Defender Experts settings.
3030

31-
[Audit (Standard)](/microsoft-365/compliance/audit-solutions-overview) is turned on by default for all Microsoft Defender Experts for XDR customers when paid licenses are assigned to the tenant. If you have a trial license, work with your service delivery manager to turn on Audit if it isn't yet.
31+
Auditing is automatically turned on in the Microsoft Defender portal. Features that are audited are logged in the audit log automatically. Auditing can also collect audit logs from GCC environments.
3232

3333
> [!NOTE]
3434
> Make sure you have the right [permissions](/microsoft-365/compliance/audit-log-search#before-you-search-the-audit-log) to search for audit logs.

defender-xdr/microsoft-xdr-auditing.md

Lines changed: 22 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Search the audit log for events in Microsoft Defender XDR
3-
description: Learn about the Microsoft Defender XDR activities that are logged in the Microsoft 365 audit log.
3+
description: Learn how to use the audit log to search for Microsoft Defender XDR activities to help with investigation.
44
ms.service: defender-xdr
55
ms.author: diannegali
66
author: diannegali
@@ -10,21 +10,21 @@ audience: ITPro
1010
ms.collection:
1111
- m365-security
1212
- tier3
13-
ms.topic: overview
14-
ms.date: 08/14/2024
13+
ms.topic: how-to
14+
ms.date: 01/14/2025
1515
search.appverid: met150
16+
appliesto:
17+
- Microsoft Defender for Endpoint Plan 2
18+
- Microsoft Defender XDR
19+
20+
#customer intent: As a SOC analyst, I want to learn how to use the audit log to search for Microsoft Defender XDR activities to help with investigation.
1621
---
1722

1823
# Search the audit log for events in Microsoft Defender XDR
1924

2025
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2126

22-
**Applies to:**
23-
24-
- [Microsoft Defender for Endpoint Plan 2](/defender-endpoint/microsoft-defender-endpoint)
25-
- [Microsoft Defender XDR](microsoft-365-defender.md)
26-
27-
The audit log can help you investigate specific activities across Microsoft 365 services. In the Microsoft Defender portal, Microsoft Defender XDR and Microsoft Defender for Endpoint activities are audited. Some of the activities audited are:
27+
The audit log helps you investigate specific activities across Microsoft 365 services. In the Microsoft Defender portal, Microsoft Defender XDR and Microsoft Defender for Endpoint activities are audited. Some of the activities audited are:
2828

2929
- Changes to data retention settings
3030
- Changes to advanced features
@@ -36,33 +36,25 @@ The audit log can help you investigate specific activities across Microsoft 365
3636

3737
For a complete list of Microsoft Defender XDR activities that are audited, see [Microsoft Defender XDR activities](#microsoft-defender-xdr-activities) and [Microsoft Defender for Endpoint activities](#microsoft-defender-for-endpoint-activities).
3838

39-
## Requirements
39+
Auditing is automatically turned on for Microsoft Defender XDR. Features that are audited are logged in the audit log automatically. Auditing can also collect audit logs from GCC environments.
40+
41+
## Prerequisites
4042

4143
To access the audit log, you need to have the **View-Only Audit Logs** or **Audit Logs** role in Exchange Online. By default, those roles are assigned to the Compliance Management and Organization Management role groups.
4244

4345
> [!NOTE]
4446
> Global administrators in Office 365 and Microsoft 365 are automatically added as members of the Organization Management role group in Exchange Online.
4547
46-
## Turn on auditing in Microsoft Defender XDR
47-
48-
Microsoft Defender XDR uses the [Microsoft Purview auditing solution](/purview/audit-solutions-overview), before you can look at the audit data in the Microsoft Defender XDR portal:
49-
50-
- You should confirm that auditing is turned on in the Microsoft Purview compliance portal. For more information, see [Turn auditing on or off](/purview/audit-log-enable-disable).
51-
52-
- Follow the steps below to enable the unified audit log in the Microsoft Defender XDR portal:
53-
1. Log in to [Microsoft Defender XDR](https://security.microsoft.com/homepage) using an account with the Security administrator or Global administrator role assigned.
54-
2. In the navigation pane, select **Settings** \> **Endpoints** \> **Advanced features**.
55-
3. Scroll own to **Unified audit log** and toggle the setting to **On**.
56-
57-
:::image type="content" source="/defender/media/defender/unified-audit-log.png" alt-text="Screenshot of the unified audit log toggle in Microsoft Defender XDR advanced settings" lightbox="/defender/media/defender/unified-audit-log.png":::
58-
4. Select **Save preferences**.
48+
Microsoft Defender XDR uses the [Microsoft Purview auditing solution](/purview/audit-solutions-overview). Before you can look at the audit data in the Microsoft Defender portal, you need to turn on auditing in the Microsoft Purview compliance portal. For more information, see [Turn auditing on or off](/purview/audit-log-enable-disable).
5949

6050
> [!IMPORTANT]
61-
> Global Administrator is a highly privileged role that should be limited to scenarios when you can't use an existing role. Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization.
51+
> Global Administrator is a highly privileged role that should be limited to scenarios when you can't use an existing role. Microsoft recommends that you use roles with the fewest permissions. Using accounts with lower permissions helps improve security for your organization.
6252
63-
## Using the audit search in Microsoft Defender XDR
53+
## Search the audit log
6454

65-
1. To retrieve audit logs for Microsoft Defender XDR activities, navigate to the [Microsoft Defender XDR Audit page](https://security.microsoft.com/auditlogsearch) or go to the [Purview compliance portal](https://compliance.microsoft.com) and select **Audit**.
55+
Follow these steps to search the audit log:
56+
57+
1. Navigate to the [Microsoft Defender portal's Audit page](https://security.microsoft.com/auditlogsearch) or go to the [Purview compliance portal](https://compliance.microsoft.com) and select **Audit**.
6658

6759
:::image type="content" source="/defender/media/defender/unified-audit-log-xdr.png" alt-text="Screenshot of the unified audit log page in Microsoft Defender XDR " lightbox="/defender/media/defender/unified-audit-log-xdr.png":::
6860

@@ -94,7 +86,7 @@ For a list of all events that are logged for user and admin activities in Micros
9486
- [Response action activities in Defender for Endpoint in the audit log](/purview/audit-log-activities#microsoft-defender-for-endpoint-reponse-actions-activities)
9587
- [Roles settings activities in Defender for Endpoint in the audit log](/purview/audit-log-activities#microsoft-defender-for-endpoint-roles-settings-activities)
9688

97-
## Using a PowerShell script
89+
## Search for events using a PowerShell script
9890

9991
You can use the following PowerShell code snippet to query the Office 365 Management API to retrieve information about Microsoft Defender XDR events:
10092

@@ -108,10 +100,10 @@ Search-UnifiedAuditLog -StartDate 2023/03/12 -EndDate 2023/03/20 -RecordType <ID
108100
>[!NOTE]
109101
> See the API column in Audit activities included for the record type values.
110102
111-
## Additional resources
103+
For more information, see [Use a PowerShell script to search the audit log](/purview/audit-log-search-script)
104+
105+
## See also
112106

113-
- [Search the audit log in the compliance center](/purview/audit-new-search)
114-
- [Use a PowerShell script to search the audit log](/purview/audit-log-search-script)
115107
- [Detailed properties in the audit log](/purview/audit-log-detailed-properties)
116108
- [Export, configure, and view audit log records](/purview/audit-log-export-records)
117109
- [Office 365 Management Activity API reference](/office/office-365-management-api/office-365-management-activity-api-reference)

0 commit comments

Comments
 (0)