We may earn an affiliate commission when you visit our partners.
Liam Cleary

Understand how to better monitor Microsoft 365 with audit logs. This course will teach you how to search, analyze, and manage audit logs effectively for enhanced security and compliance.

Read more

Understand how to better monitor Microsoft 365 with audit logs. This course will teach you how to search, analyze, and manage audit logs effectively for enhanced security and compliance.

Maintaining security and compliance in Microsoft 365 can be challenging without proper monitoring. In this course, Microsoft Purview: Audit Log Monitoring in Microsoft 365, you'll learn to effectively search, analyze, and manage audit logs. First, you'll explore the differences between standard and premium audit logs and how to enable audit log monitoring. Next, you'll discover how to search audit logs using Microsoft Purview and PowerShell. Finally, you'll learn how to implement Exchange mailbox auditing, create alert policies, and connect to the Office 365 Management Activity API and Microsoft Graph. When you're finished with this course, you'll have the skills and knowledge needed to enhance security and compliance in your organization using Microsoft 365 audit logs.

Enroll now

What's inside

Syllabus

Course Overview
Introduction to Monitoring Microsoft 365 Using Audit Logs
Searching Audit Logs Using Microsoft Purview and PowerShell
Implementing Exchange Mailbox Auditing and Alert Policies
Read more
Searching Audit Logs Using the Activity API and the Microsoft Graph

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Teaches advanced audit log monitoring skills, which are essential for enhancing security and compliance in Microsoft 365
Explores the differences between standard and premium audit logs, which is a crucial aspect of audit log monitoring
Provides a comprehensive understanding of how to search, analyze, and manage audit logs, which are critical skills for maintaining security and compliance
Focuses on key areas such as Exchange mailbox auditing and alert policies, which are essential for implementing effective security measures
Covers advanced topics such as the Office 365 Management Activity API and Microsoft Graph integration, which are valuable for enhancing audit log monitoring capabilities
Taught by Liam Cleary, an experienced instructor who provides valuable insights and practical guidance

Save this course

Save Microsoft Purview: Audit Log Monitoring in Microsoft 365 to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Microsoft Purview: Audit Log Monitoring in Microsoft 365 with these activities:
Review PowerShell Basics
Ensure a solid foundation in PowerShell to enhance your ability to analyze audit logs effectively.
Browse courses on Powershell
Show steps
  • Revisit basic PowerShell commands and syntax
  • Practice using PowerShell to manage files and directories
  • Review connecting to Microsoft 365 using PowerShell
Microsoft Purview Auditing Tutorials
Supplement your learning by exploring Microsoft's official tutorials on advanced audit log monitoring.
Show steps
  • Visit the Microsoft Purview documentation website
  • Select the 'Tutorial' section
  • Follow the step-by-step instructions to gain hands-on experience
  • Apply the concepts to your Microsoft 365 organization
Audit Log Monitoring Resource Library
Stay organized by compiling a collection of relevant resources to support your ongoing learning journey.
Show steps
  • Create a dedicated folder or notebook for course materials
  • Organize resources by topic or activity type
  • Include course notes, slides, tutorials, and any additional resources
  • Review and update your resource library periodically
Four other activities
Expand to see all activities and additional details
Show all seven activities
Analyze Audit Logs using PowerShell
Enhance your understanding of audit log queries by practicing PowerShell commands.
Show steps
  • Connect to Microsoft 365 PowerShell
  • Use Get-UnifiedAuditLogSearch cmdlet to retrieve audit logs
  • Filter logs using parameters such as StartDate, EndDate, and UserID
  • Export logs to a CSV file for further analysis
Audit Log Analysis Group Discussion
Engage with peers to exchange insights and reinforce your knowledge of audit log monitoring techniques.
Show steps
  • Join an online discussion forum or create a study group
  • Select a specific topic for discussion, such as advanced query techniques or compliance reporting
  • Participate actively by sharing your ideas and asking questions
  • Synthesize the group's insights and apply them to your own understanding
Example Project: Monitor Microsoft 365 Activity Logs
Demonstrate your understanding of audit log monitoring by setting up a monitoring project for Microsoft 365 tenant.
Show steps
  • Create a new project in your Azure portal
  • Configure log sources and retention policies
  • Set up alerts to notify you of suspicious activities
  • Monitor the project's dashboard and investigate any security incidents
Audit Log Monitoring Presentation
Solidify your understanding by creating a comprehensive presentation summarizing key concepts and best practices.
Browse courses on Security Monitoring
Show steps
  • Gather information from the course materials and external resources
  • Develop an outline and organize your content
  • Design slides with clear visuals and concise text
  • Practice presenting your findings

Career center

Learners who complete Microsoft Purview: Audit Log Monitoring in Microsoft 365 will develop knowledge and skills that may be useful to these careers:
Cloud Security Engineer
As a Cloud Security Engineer, you will be responsible for securing data and systems in the cloud. You will need to have a strong understanding of cloud security best practices, as well as experience with cloud security tools and technologies. This course can help you build a foundation in cloud security and prepare you for a career as a Cloud Security Engineer. You will learn how to search, analyze, and manage audit logs in Microsoft 365, which is an essential skill for any cloud security professional.
Security Analyst
As a Security Analyst, you will be responsible for monitoring and analyzing security events, as well as investigating and responding to security incidents. You will need to have a strong understanding of security principles and practices, as well as experience with security monitoring and analysis tools and technologies. This course can help you build a foundation in security analysis and prepare you for a career as a Security Analyst. You will learn how to search, analyze, and manage audit logs in Microsoft 365, which is an essential skill for any security professional.
Compliance Analyst
As a Compliance Analyst, you will be responsible for ensuring that your organization is compliant with all applicable laws and regulations. You will need to have a strong understanding of compliance requirements, as well as experience with compliance auditing and reporting tools and technologies. This course can help you build a foundation in compliance analysis and prepare you for a career as a Compliance Analyst. You will learn how to search, analyze, and manage audit logs in Microsoft 365, which is an essential skill for any compliance professional.
IT Auditor
As an IT Auditor, you will be responsible for auditing IT systems and processes to ensure that they are compliant with all applicable laws and regulations. You will need to have a strong understanding of auditing principles and practices, as well as experience with auditing tools and technologies. This course can help you build a foundation in IT auditing and prepare you for a career as an IT Auditor. You will learn how to search, analyze, and manage audit logs in Microsoft 365, which is an essential skill for any IT auditor.
Information Security Manager
As an Information Security Manager, you will be responsible for developing and implementing security policies and procedures, as well as managing security risks. You will need to have a strong understanding of information security principles and practices, as well as experience with security management tools and technologies. This course can help you build a foundation in information security management and prepare you for a career as an Information Security Manager. You will learn how to search, analyze, and manage audit logs in Microsoft 365, which is an essential skill for any information security professional.
Security Engineer
As a Security Engineer, you will be responsible for designing, implementing, and maintaining security systems and solutions. You will need to have a strong understanding of security principles and practices, as well as experience with security engineering tools and technologies. This course can help you build a foundation in security engineering and prepare you for a career as a Security Engineer. You will learn how to search, analyze, and manage audit logs in Microsoft 365, which is an essential skill for any security engineer.
Cybersecurity Analyst
As a Cybersecurity Analyst, you will be responsible for monitoring and analyzing security events, as well as investigating and responding to security incidents. You will need to have a strong understanding of cybersecurity principles and practices, as well as experience with cybersecurity tools and technologies. This course can help you build a foundation in cybersecurity analysis and prepare you for a career as a Cybersecurity Analyst. You will learn how to search, analyze, and manage audit logs in Microsoft 365, which is an essential skill for any cybersecurity professional.
Network Security Engineer
As a Network Security Engineer, you will be responsible for designing, implementing, and maintaining network security systems and solutions. You will need to have a strong understanding of network security principles and practices, as well as experience with network security tools and technologies. This course may be useful as it will provide you with a foundation in security analysis and monitoring, which are essential skills for any network security engineer.
IT Security Specialist
As an IT Security Specialist, you will be responsible for implementing and maintaining security measures to protect an organization's IT infrastructure. This course may be useful as it will provide you with a foundation in security analysis and monitoring, which are essential skills for any IT security specialist.
Data Security Analyst
As a Data Security Analyst, you will be responsible for protecting an organization's data from unauthorized access, use, disclosure, disruption, modification, or destruction. This course may be useful as it will provide you with a foundation in security analysis and monitoring, which are essential skills for any data security analyst.
IT Support Specialist
As an IT Support Specialist, you will be responsible for providing technical support to users of computer systems. This course may be useful as it will provide you with a foundation in security analysis and monitoring, which are essential skills for any IT support specialist.
Help Desk Technician
As a Help Desk Technician, you will be responsible for providing technical support to users of computer systems. This course may be useful as it will provide you with a foundation in security analysis and monitoring, which are essential skills for any help desk technician.
Network Administrator
As a Network Administrator, you will be responsible for managing and maintaining an organization's computer network. This course may be useful as it will provide you with a foundation in security analysis and monitoring, which are essential skills for any network administrator.
Database Administrator
As a Database Administrator, you will be responsible for managing and maintaining an organization's databases. This course may be useful as it will provide you with a foundation in security analysis and monitoring, which are essential skills for any database administrator.
Systems Administrator
As a Systems Administrator, you will be responsible for managing and maintaining an organization's computer systems. This course may be useful as it will provide you with a foundation in security analysis and monitoring, which are essential skills for any systems administrator.

Reading list

We've selected four books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Microsoft Purview: Audit Log Monitoring in Microsoft 365.
Covers a range of topics related to Microsoft 365 security administration, including audit logs, security policies, and threat protection.
A guide to memory forensics, with detailed information on collecting and analyzing audit logs.
Provides practical guidance on how to secure Microsoft Windows systems, including how to use audit logs for threat detection and prevention.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Microsoft Purview: Audit Log Monitoring in Microsoft 365.
Microsoft Purview: Manage and Protect Microsoft 365...
Most relevant
Managing Governance and Compliance Features in Microsoft...
Most relevant
Microsoft Information Protection and Compliance:...
Most relevant
Microsoft 365 Administration: Managing Compliance Using...
Most relevant
Microsoft Purview: Records Management and eDiscovery in...
Most relevant
Microsoft Purview: Introduction and Getting Started
Most relevant
Microsoft Purview: Manage and Protect On-premises Content
Most relevant
Microsoft Information Protection and Compliance:...
Most relevant
Microsoft 365 Security, Compliance, and Identity Concepts
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser