Microsoft 365 Logs

Panther supports pulling logs directly from Microsoft 365

Overview

Panther can pull logs from Microsoft's Office 365 Management Activity API. Panther will query the API every 5 minutes.

How to onboard Microsoft 365 logs to Panther

Prerequisite

  • Enable audit logging for your Microsoft 365 tenancy through the Security and Compliance Center in the Office 365 Admin Portal.

Step 1: Registering an application in Azure AD

  1. Log in to your Azure portal and navigate to the Azure Active Directory service. In the Azure portal, the phrase "azure ac" has been typed into the search bar. A dropdown menu below the search bar shows a list of services. "Azure Active Directory" is highlighted.

  2. Click App Registrations in the left sidebar and then click New Registration.

  3. Enter a memorable name for your application. In the Supported account types field, select Accounts in this organizational directory only.

  4. Click Register.

  5. On the left sidebar, click Certificates and Secrets. Then click New Client Secret.

    • Add a description for the secret (e.g Panther integration).

    • Set the Expires field to 24 Months.

  6. Click Add.

    • The Client Secret will be hidden after you navigate away from this page, so copy down the Value field (not Secret ID field) before continuing.

  7. On the left sidebar, click API Permissions and then Add a permission. Find and click the Office 365 Management APIs.

  8. Click Delegated permissions and select all permissions: ActivityFeed.Read, ActivityFeed.ReadDlp, ServiceHealth.Read. In the Azure Portal, the permission page is displayed. The boxes are checked next to ActivityFeed.Read, ActivityFeed.ReadDlp, and ServiceHealth.Read.

  9. Click Application permissions and select all permissions: ActivityFeed.Read, ActivityFeed.ReadDlp, ServiceHealth.Read.

  10. Click Add permissions at the bottom.

    • Make sure to add both Delegated and Application permissions in the previous two steps.

  11. Click Grant admin consent in the API permissions page. The "Configured Permissions" page from the Azure Portal is displayed. There is a link labeled "Grant admin consent for pantherlabsinc" with a green checkmark next to it. In the image there is a red circle around the link.

  12. After consent has been granted, click the Overview tab in the left sidebar to view your Application (client) ID and Directory (tenant) ID. You will need to provide these to Panther in the next step. In the Azure Portal, the Overview tab in the left sidebar is highlighted. In the middle of the page, the Application Tenant ID and Directory tenant ID are displayed.

Step 2: Create a new Microsoft Source in Panther

  1. In the left-hand navigation bar of your Panther Console, click Configure > Log Sources.

  2. Click Create New.

  3. Search for "Microsoft 365," then click its tile.

  4. On the slide-out panel, click Start Setup.

  5. On the next screen, enter a descriptive name for the source e.g., My Microsoft 365 logs and select the log types to ingest.

  6. Click Setup.

  7. On the Credentials page, enter values for the following fields:

    • Client ID

    • Tenant ID

    • Client Secret

  8. Click Setup. You will be directed to a success screen:\

    The success screen reads, "Everything looks good! Panther will now automatically pull & process logs from your account"
    • You can optionally enable one or more Detection Packs.

    • The Trigger an alert when no events are processed setting defaults to YES. We recommend leaving this enabled, as you will be alerted if data stops flowing from the log source after a certain period of time. The timeframe is configurable, with a default of 24 hours.\

      The "Trigger an alert when no events are processed" toggle is set to YES. The "How long should Panther wait before it sends you an alert that no events have been processed" setting is set to 1 Day

Supported log types

Microsoft365.Audit.AzureActiveDirectory

Azure Active Directory audit events.

Reference: Microsoft Documentation on Management Activity API Schemas.

Microsoft365.Audit.Exchange

Microsoft Exchange audit events.

Reference: Microsoft Documentation on Management Activity API Schemas.

Microsoft365.Audit.General

General audit events from Office 365 services that are not included in the other log types. This can include, for example, Microsoft Teams logs.

Reference: Microsoft Documentation on Management Activity API Schemas.

Microsoft365.Audit.SharePoint

Microsoft SharePoint audit events.

Reference: Microsoft Documentation on Management Activity API Schemas.

Microsoft365.DLP.All

DLP events for all workloads.

Reference: Microsoft Documentation on DLP Schemas.

Last updated

Was this helpful?