Skip to main content
Version: 2.1.1-preview

CIS.M365.3.1.1 - (L1) Ensure Microsoft 365 audit log search is Enabled

Overview

3.1.1 (L1) Ensure Microsoft 365 audit log search is Enabled

When audit log search is enabled in the Microsoft Purview compliance portal, user and admin activity within the organization is recorded in the audit log and retained for 180 days by default. However, some organizations may prefer to use a third-party security information and event management (SIEM) application to access their auditing data. In this scenario, a global admin can choose to turn off audit log search in Microsoft 365.

Rationale

Enabling audit log search in the Microsoft Purview compliance portal can help organizations improve their security posture, meet regulatory compliance requirements, respond to security incidents, and gain valuable operational insights

Remediation action:

  1. Navigate to Microsoft 365 Purview.
  2. Select Solutions and then Audit to open the audit search.
  3. Click blue bar Start recording user and admin activity.
  4. Click Yes on the dialog box to confirm.
PowerShell
  1. Connect to Exchange Online using Connect-ExchangeOnline.
  2. Run the following PowerShell command:
Set-AdminAuditLogConfig -UnifiedAuditLogIngestionEnabled $true

Test Metadata

FieldValue
Test IDCIS.M365.3.1.1
SeverityHigh
SuiteCIS
CategoryCIS E3 Level 1
PowerShell testTest-MtCisAuditLogSearch
TagsCIS, CIS E3, CIS E3 Level 1, CIS M365 v6.0.1, CIS.M365.3.1.1, L1

Source

  • Pester test: tests/cis/Test-MtCisAuditLogSearch.Tests.ps1
  • PowerShell source: powershell/public/cis/Test-MtCisAuditLogSearch.ps1