Configure Microsoft Office 365 Log Collector
The instructions in this document are for the Alert Logic Application Registry setup of the Microsoft Office 365 log collector. If you have to reference instructions or information for the older setup of the log collector, see Set Up Collection of Microsoft Office 365 Logs.
The Alert Logic Microsoft Office 365 collector is an AWS-based API Poll (PAWS) log collector library mechanism designed to collect logs. You can find Office 365 logs collected with keyword search in the Alert Logic console Search: Log Messages page. Alert Logic also generates security incidents from Office 365 logs in the Incidents page. For more information about authentication application security content, see Authentication Application Security Incidents.
The Alert Logic Microsoft Office 365 collector can collect from these specific Office 365 content streams:
- Audit logs from Azure Active Directory
- Audit logs from Microsoft Office 365 Exchange
- Audit logs from SharePoint
- General audit logs
A single Office 365 collector can collect logs from any or all the content streams that you configure in the Alert Logic console. These audit logs are collected through Microsoft Stream. For more information on Microsoft Stream, go to Audit logs in Microsoft Stream.
You must complete the following to successfully configure your Office 365 Log Collector:
- Register a new Office 365 web application
- Set up Active Directory security permissions
- Configure collection in the Alert Logic console
In the Office 365 portal, you must register a new Office 365 web application to collect Office 365 logs.
To register an Office 365 web application:
- Log into the Office 365 portal as an Active Directory tenant administrator.
- In the left menu, click Azure Active Directory.
- Select App Registrations, and then click + New application registration.
- Provide the following information in the fields:
- Enter a name for the application —for example, alo365collector.
- Under Supported account types, select Single tenant .
- Under Redirect URI (optional), leave the Redirect URI field blank.
- Click Register. Note the Application (client) ID, for example, a261478c-84fb-42f9-84c2-de050a4babe3, and the Directory (tenant) ID.
You must set up Active Directory security permissions for the application you created so it can read threat intelligence data and activity reports for your organization.
To set up Active Directory permissions:
- On the main panel under the new application, click View API Permissions, and then click + Add a permission.
- Locate and click Office 365 Management APIs, and then click Select.
- In Application permissions, expand and select ActivityFeed.Read, ActivityReports.ReadDlp, and ServiceHealth.Read.
- Ensure all necessary permissions are selected, and then click Add permissions.
- Click Grant admin consent, and then click Accept to confirm.
- On the left navigation area, select Certificates & secrets, and then click + New client secret.
- Type a key Description and set the expiration to Never.
- Click Add.
- Save the value (client secret), which you will need later.
After you register a new Office 365 application and set up permissions, you must complete the log collection configuration process in the Alert Logic console. This configuration is an account-level integration, which means you can configure more than one instance of Office 365 collection. This capability is useful when more than one instance of the application exists.
To access the Application Registry page, click the menu icon () from the Dashboards page. Click Configure, and then click Application Registry.
To add a new application collection:
- On the Applications List tab, use the drop-down menu to select the application type you want to see.
- In the Office 365 tile, click GET STARTED.
- In the Application Name field, enter a name for this Office 365 collection instance.
- Under Collection Method and Policy, in the Client ID field, enter the Azure Client ID associated with your registered Office 365 application.
- In the Client Secret, enter your client secret.
- In the Tenant ID field, enter your tenant ID. To find your Office 365 tenant ID, see Find your Office 365 tenant ID.
- Select the content streams from which you want to collect logs.
- (Optional) Enter a Collection Start time using a format such as (2020-01-01T16:00:00Z). If the Collection Start field is left blank, only logs generated after you configure this collection instance will be collected.
The collection start time determines how far back you want Alert Logic to collect logs if data already exists in your account. Alert Logic can only collect logs up to 30 days prior to the date you configured this collection instance.
- Click ADD.
Wait a few minutes for the application to create and appear in your application list. Do not click ADD again. Alert Logic Office 365 accounts for some third-party product APIs that may fail if attempting to pull log data for an older timeframe that is not available. The Alert Logic Office 365 collector does not attempt an invalid request to the API, and instead moves the target collection date to the earliest valid date available.
In the Applications List tab, if you configured your application correctly, within approximately 10 minutes you will Configured next to the application. For more information about how to add instances or manage existing collecting applications, see Manage your configured applications.
Security content for Incidents
Alert Logic builds collectors to capture data from Office 365 and various other applications to create security content that is used to generate incidents for key security use cases. The following security incidents are available for Office 365:
- Administrative Actions
- User Login AD
- User Behavior AD
For more information about authentication application security content, see Authentication Application Security Incidents.