5.1 Ensure Microsoft 365 audit log search is Enabled

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

When audit log search in the Microsoft 365 Security & Compliance Center is enabled, user and admin activity from your organization is recorded in the audit log and retained for 90 days. However, your organization might be using a third-party security information and event management (SIEM) application to access your auditing data. In that case, a global admin can turn off audit log search in Microsoft 365.

Rationale:

Enabling Microsoft 365 audit log search helps Office 365 back office teams to investigate activities for regular security operational or forensic purposes.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

To enable Microsoft 365 audit log search, use the Microsoft 365 Admin Center:

Log in as an administrator.

Navigate to the Office 365 security & compliance center by going to https://protection.office.com

In the Security & Compliance Center, expand Search then select Audit log search.

Click Start recording user and admin activities next to the information warning at the top.

Click Yes on the dialog box to confirm.

To enable Microsoft 365 audit log search, use the Exchange Online PowerShell Module:

Run Microsoft Exchange Online PowerShell Module.

Connect using Connect-EXOPSSession.

Run the following PowerShell command:

Set-AdminAuditLogConfig -AdminAutidLogEnabled $true -UnifiedAuditLogIngestionEnabled $true

A message is displayed saying that it might take up to 60 minutes for the change to take effect. If an error appears, you may need to run Enable-OrganizationCustomization before disconnecting and trying the command again.

Default Value:

disabled

See Also

https://workbench.cisecurity.org/files/3433