Tuesday, December 3, 2024
HomeCyber Security NewsMicrosoft Expands Security Logging and Offers 365 Clients Free Access

Microsoft Expands Security Logging and Offers 365 Clients Free Access

Published on

SIEM as a Service

Microsoft expanded cloud logging accessibility and flexibility for customers’ deeper security visibility.

This expansion coordinates results with commercial and government customers and the Cybersecurity and Infrastructure Security Agency (CISA) about security to provide cloud customers with insight and analysis.

The wider availability of a Microsoft signing key has emerged following a notorious incident involving Chinese hackers.

- Advertisement - SIEM as a Service

These hackers managed to exploit the key, gaining unauthorized access to numerous corporate and government Microsoft Exchange and Microsoft 365 accounts, ultimately resulting in the theft of sensitive email data.

With the cloud, software updates happen automatically and security monitoring is centralized.

Log data provides detailed and auditable information on application and device access for customers using the cloud.

Digital forensics and incident response teams rely on log data to identify instances where an attacker is posing as an authorized user.

Microsoft provides cloud security to worldwide customers at no additional ended the coming months.

Microsoft Purview Audit

Customers can utilize Microsoft Purview Audit to visualize various types of log data, enabling them to respond more effectively to security events, investigations, and compliance obligations.

In Audit (standard), after expanding, the customer has a detailed log of email access and more than 30 other types of log data previously available only at the premium level also it increases the retention period from 90 days to 180 days.

In Audit (Premium) already, customers will receive access to all available audit logging events, including insights it helps in the Microsoft purview compliance portal and Office 365 Management Activity API.  An additional feature of expanding Premium includes longer retention periods and automation support for importing log data. 

“After working collaboratively for over a year, I am extremely pleased with Microsoft’s decision to make necessary log types available to the broader cybersecurity community at no additional cost,” said CISA Director Jen Easterly.

The update will be rolled out over September 2023 to all government and commercial customers.

All the existing and new logs can be accessible; visit the Microsoft Purview compliance portal and select Audit from the Solutions panel.

“We believe that every organization deserves to have products that are secure by design and come with necessary security data “out of the box,” reads the CISA report.

Latest articles

PEFT-As-An-Attack, Jailbreaking Language Models For Malicious Prompts

Federated Parameter-Efficient Fine-Tuning (FedPEFT) is a technique that combines parameter-efficient fine-tuning (PEFT) with federated...

Hackers Cloning Websites, Exploiting RCE Flaws To Gain Access To Shopping Platforms

Cybercriminals are leveraging AI-powered phishing attacks, website cloning tools, and RCE exploits to target...

Hackers Exploited Windows Event Logs Tool log Manipulation, And Data Exfiltration

wevtutil.exe, a Windows Event Log management tool, can be abused for LOLBAS attacks. By...

Threat Actors Allegedly Claims Breach of EazyDiner Reservation Platform

Reports have emerged of a potential data breach involving EazyDiner, a leading restaurant reservation...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

PEFT-As-An-Attack, Jailbreaking Language Models For Malicious Prompts

Federated Parameter-Efficient Fine-Tuning (FedPEFT) is a technique that combines parameter-efficient fine-tuning (PEFT) with federated...

Hackers Cloning Websites, Exploiting RCE Flaws To Gain Access To Shopping Platforms

Cybercriminals are leveraging AI-powered phishing attacks, website cloning tools, and RCE exploits to target...

Hackers Exploited Windows Event Logs Tool log Manipulation, And Data Exfiltration

wevtutil.exe, a Windows Event Log management tool, can be abused for LOLBAS attacks. By...