Skip to content

Commit 8cb8f94

Browse files
Merge pull request #34191 from KenMAG/main
Removed redundant H2 headings from includes
2 parents a1fcb42 + 6317494 commit 8cb8f94

9 files changed

+6
-13
lines changed

learn-pr/wwl-sci/investigate-threats-using-audit-in-microsoft-365-defender-microsoft-purview-standard/1-introduction.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
### YamlMime:ModuleUnit
22
uid: learn.wwl.investigate-threats-using-audit-in-microsoft-365-defender-microsoft-purview-standard.introduction
3-
title: Introduction
3+
title: Introduction to threat investigation with the Unified Audit Log (UAL)
44
metadata:
5-
title: Introduction
6-
description: "Introduction unit."
5+
title: Introduction to threat investigation with the Unified Audit Log (UAL)
6+
description: "Introduction to threat investigation with the Unified Audit Log (UAL)."
77
ms.date: 2/17/2023
88
author: wwlpublish
99
ms.author: kelawson

learn-pr/wwl-sci/investigate-threats-using-audit-in-microsoft-365-defender-microsoft-purview-standard/5-search-audit-log.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
### YamlMime:ModuleUnit
22
uid: learn.wwl.investigate-threats-using-audit-in-microsoft-365-defender-microsoft-purview-standard.search-audit-log
3-
title: Search the audit log
3+
title: Search the Unified Audit Log (UAL)
44
metadata:
5-
title: Search the audit log
6-
description: "Search the audit log."
5+
title: Search the Unified Audit Log (UAL)
6+
description: "Search the Unified Audit Log (UAL)."
77
ms.date: 2/17/2023
88
author: wwlpublish
99
ms.author: kelawson

learn-pr/wwl-sci/investigate-threats-using-audit-in-microsoft-365-defender-microsoft-purview-standard/includes/1-introduction.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,3 @@
1-
## Introduction to threat investigation with the Unified Audit Log (UAL)
21

32
Thousands of user and admin activities performed in Microsoft 365 services and solutions are captured, recorded, and retained in the Unified Audit Log (UAL). Audit records for these events are searchable using the Microsoft Purview or Microsoft 365 Defender portal Audit Search, or by using the Microsoft Exchange policy-and-compliance-audit PowerShell cmdlets.
43

learn-pr/wwl-sci/investigate-threats-using-audit-in-microsoft-365-defender-microsoft-purview-standard/includes/2-explore-microsoft-purview-audit-solutions.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,3 @@
1-
## Explore Microsoft Purview auditing solutions
21

32
Microsoft Purview auditing solutions provide an integrated solution to help organizations effectively respond to:
43

learn-pr/wwl-sci/investigate-threats-using-audit-in-microsoft-365-defender-microsoft-purview-standard/includes/3-implement-microsoft-purview-audit.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,3 @@
1-
## Implement Microsoft Purview Audit (Standard)
21

32
Microsoft Purview Audit (Standard) is enabled by default for most Microsoft 365 and Office 365 organizations. As a result, there's only a few things an organization must do before it can search the audit log.
43

learn-pr/wwl-sci/investigate-threats-using-audit-in-microsoft-365-defender-microsoft-purview-standard/includes/4-exercise-start-recording-audit-log.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,3 @@
1-
## Start recording activity in the Unified Audit Log
21

32
You have already learned that Audit (Standard) is enabled by default for all organizations with the appropriate subscription, but you still have to start the recording. In this exercise you'll explore the following:
43

learn-pr/wwl-sci/investigate-threats-using-audit-in-microsoft-365-defender-microsoft-purview-standard/includes/5-search-audit-log.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,3 @@
1-
## Search the Unified Audit Log (UAL)
21

32
An organization can use the audit log search tool in the Microsoft Purview compliance portal to search the unified audit log. By doing so, the organization can view user and administrator activity. For example, an organization may need to determine if a user viewed a specific document or purged an item from their mailbox.
43

learn-pr/wwl-sci/investigate-threats-using-audit-in-microsoft-365-defender-microsoft-purview-standard/includes/6-export-configure-view-audit-log-records.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,3 @@
1-
## Export, configure and view audit log records
21

32
After you search the audit log and download the search results to a CSV file, the file contains a column named **AuditData**. This column contains additional information about each event. The data in this column is formatted as a JSON object, which contains multiple properties that are configured as **property:value** pairs separated by commas.
43

learn-pr/wwl-sci/investigate-threats-using-audit-in-microsoft-365-defender-microsoft-purview-standard/includes/7-use-audit-log-searches-to-investigate-common-support-issues.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,3 @@
1-
## Use audit log searches to investigate common support issues
21

32
This unit describes how organizations can use the audit log search tool to help them investigate the following common support issues:
43

0 commit comments

Comments
 (0)