Monday, February 24, 2025
HomeCyber Security NewsMicrosoft Expands Security Logging and Offers 365 Clients Free Access

Microsoft Expands Security Logging and Offers 365 Clients Free Access

Published on

SIEM as a Service

Follow Us on Google News

Microsoft expanded cloud logging accessibility and flexibility for customers’ deeper security visibility.

This expansion coordinates results with commercial and government customers and the Cybersecurity and Infrastructure Security Agency (CISA) about security to provide cloud customers with insight and analysis.

The wider availability of a Microsoft signing key has emerged following a notorious incident involving Chinese hackers.

These hackers managed to exploit the key, gaining unauthorized access to numerous corporate and government Microsoft Exchange and Microsoft 365 accounts, ultimately resulting in the theft of sensitive email data.

With the cloud, software updates happen automatically and security monitoring is centralized.

Log data provides detailed and auditable information on application and device access for customers using the cloud.

Digital forensics and incident response teams rely on log data to identify instances where an attacker is posing as an authorized user.

Microsoft provides cloud security to worldwide customers at no additional ended the coming months.

Microsoft Purview Audit

Customers can utilize Microsoft Purview Audit to visualize various types of log data, enabling them to respond more effectively to security events, investigations, and compliance obligations.

In Audit (standard), after expanding, the customer has a detailed log of email access and more than 30 other types of log data previously available only at the premium level also it increases the retention period from 90 days to 180 days.

In Audit (Premium) already, customers will receive access to all available audit logging events, including insights it helps in the Microsoft purview compliance portal and Office 365 Management Activity API.  An additional feature of expanding Premium includes longer retention periods and automation support for importing log data. 

“After working collaboratively for over a year, I am extremely pleased with Microsoft’s decision to make necessary log types available to the broader cybersecurity community at no additional cost,” said CISA Director Jen Easterly.

The update will be rolled out over September 2023 to all government and commercial customers.

All the existing and new logs can be accessible; visit the Microsoft Purview compliance portal and select Audit from the Solutions panel.

“We believe that every organization deserves to have products that are secure by design and come with necessary security data “out of the box,” reads the CISA report.

Latest articles

Biggest Crypto Hack in History – Hackers Stolen $1.46 Billion Worth Crypto From Bybit

In what has become the largest cryptocurrency theft in history, hackers infiltrated Bybit’s Ethereum...

PoC Exploit Released for F5 BIG-IP Command Injection Vulnerability

Security researchers have disclosed critical details about CVE-2025-20029, a command injection vulnerability in F5’s BIG-IP...

Google Introduces Quantum-Safe Digital Signatures in Cloud KMS

Google Cloud has unveiled a critical cybersecurity upgrade: quantum-safe digital signatures via its Key Management Service...

New Zhong Stealer Malware Exploit Zendesk to Attack Fintech and Cryptocurrency

A newly identified malware, dubbed Zhong Stealer, has emerged as a significant threat to...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Biggest Crypto Hack in History – Hackers Stolen $1.46 Billion Worth Crypto From Bybit

In what has become the largest cryptocurrency theft in history, hackers infiltrated Bybit’s Ethereum...

PoC Exploit Released for F5 BIG-IP Command Injection Vulnerability

Security researchers have disclosed critical details about CVE-2025-20029, a command injection vulnerability in F5’s BIG-IP...

Google Introduces Quantum-Safe Digital Signatures in Cloud KMS

Google Cloud has unveiled a critical cybersecurity upgrade: quantum-safe digital signatures via its Key Management Service...