- 26 Mar 2025
- 4 Minutes to read
- Print
- DarkLight
Microsoft Defender for Office 365 Audits
- Updated on 26 Mar 2025
- 4 Minutes to read
- Print
- DarkLight
Microsoft Defender for Office 365 allows you to secure your email and Microsoft Teams with advanced protection against phishing, business email compromise, ransomware, and other cyberthreats. For detailed information, refer to Microsoft’s official documentation.
Integration Method: API
Tables: Data Security Finding (2004), Web Resource Activity (6001), File Hosting Activity (6006), Group Management (3006), Email File Activity (4011), Entity Management (3004)
The integration supports the following events.
Event | Description |
---|---|
Audit.SharePoint | Captures SharePoint Online and OneDrive for Business activities, including file access, sharing, and permission modifications. |
DLP.All | Retrieves Data Loss Prevention (DLP) events across all Office 365 workloads, including Exchange, SharePoint, and OneDrive. |
Audit.Exchange | Includes Exchange Online audit logs, such as mailbox access, message deletions, and changes to mailbox settings. |
This integration supports the following versions.
Microsoft Office 365 management API | v1 |
Note:
Microsoft defender for Office 365 is a continuously updated cloud service. As of this document preparation, latest release was on February 11,2025
Prerequisites
Access to the Azure portal with an account that has the Global Administrator role.
Access to the DataBee console.
Configuration Overview
Create an application with required permissions to fetch the data.
Create an application
Add endpoint access
Create the client secret
Create Microsoft Defender for Office 365 Audits Data Feed in the DataBee console with the required Client credentials.
DataBee Feed Parameter | Azure Parameter |
---|---|
Client Key | |
Client Secret | |
Token URL(<tenant_id>) |
Azure Configuration
Create an application
Log on to Azure portal with an account that has the Global Administrator role.
In the search bar, search for App Registrations and select it.
On the App registrations page, select New registration, then Register an application window will appear.
On the Register an application window:
Under Name enter your Application Name then click on Register to create the application.
On the app Overview page, copy the Application (client) ID and Directory (tenant) ID for later use.
Add Endpoint Access
Once the application is created, three permissions to the Office 365 Management APIs are needed. This section details how to configure and add permissions to the required endpoints.
Add Permissions
From the Azure Active Directory portal:
Select the application registered in the previous step.
Under Manage, click API Permissions and then click Add a Permission, the Request API permissions window will appear.
On Request API permissions window, Click on Microsoft APIs.
Scroll down and click on Office 365 Management APls
Click on Application Permissions.
The following permissions need to be granted for the endpoint to function properly:
Endpoints | Type | Permission |
---|---|---|
ActivityFeed.Read | Application | Read activity data for your organization |
ActivityFeed.ReadDlp | Application | Read DLP policy events including detected sensitive data |
ServiceHealth.Read | Application | Read service health information for your organization |
From the ActivityFeed dropdown, select
ActivityFeed.Read and ActivityFeed.ReadDlp permissions
From the ServiceHealth dropdown, select
ServiceHealth.Read.
Click the Add permissions button after selecting all required permissions.
On the API permissions page, click Grant Admin Consent for <tenant>.
Click the Yes button on the consent confirmation.
The necessary permissions have now been added for the endpoints. After this step, the permissions should include these minimum required permissions shown
Creating the Client Secret
The final step to accessing the APIs is creating a Client Secret. To create it from the Azure Portal:
Select the application created above.
Under Manage, Click Certificates and Secrets, and then Client Secrets.
Click New client secret. Then Add a client secret window appears.
On Add a client secret window:
Enter a Description for this client secret and select the desired expiry period from the Expires drop-list.
Then click on Add to create the client secret.
Note:
The user needs to re-create the client secret when it expires.
Copy Client Secrets Value field for later use.
Data Bee Configuration
Login to the DataBee UI, navigate to Data > Data Feeds and click the Add New Data Feed button.
Search for Microsoft Defender for Office 365 Audits and select it.
Click on the API Ingest.
Enter feed contact information and click Next
In the configuration page, enter the following:
Authorization Method: OAuth2
Client Key: paste the Application (Client) ID generated earlier in the Azure portal.
Client Secret: paste the Client Secret value generated earlier in the Azure portal.
Tenant ID: paste the Directory (Tenant) ID collected earlier in the Azure portal.
Token URL: replace <tenant_id> with your Directory (Tenant) ID.
Note:
The URL for the API endpoint that you use is based on the type of Microsoft 365 or Office 365 subscription plan for your organization. Here, we have used the URL for Enterprise plan. You can change the URL as per subscription plan for your organization.
Below are the list of URLs as per the subscription plans. previous
Enterprise plan: https://manage.office.com
GCC government plan: https://manage-gcc.office.com
GCC High government plan: https://manage.office365.us
DoD government plan: https://manage.protection.apps.mil
Click Submit.
Troubleshooting Tips
If you encounter an "Invalid client" or "Unauthorized client" error, it may be due to incorrect credentials. Please double-check that the client key, client secret, and Tenant ID are entered correctly. Since the client secret is only visible upon creation, you may need to regenerate it. To avoid any issues, consider pasting it into a text editor to ensure there are no extra spaces or unexpected characters before reconfiguring the feed.
If you receive an "Unauthorized" error, it may be because the client ID and client secret belong to different applications. Kindly verify that you are using credentials from the same application to resolve the issue.
If we encounter a 401 response code, it is likely due to missing permissions. Ensure that all required permissions are correctly granted as per the steps outlined above.
For example:
{"error":{"code":"AF10001","message":"The permission set () sent in the request does not include the expected permission."}}