Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

CISA Offers New Cloud Logging Guidance

January 16, 2025
Reading Time: 2 mins read
in News
Apple Opens Information Security Internship

CISA has released guidance aimed at helping government agencies and enterprises enhance their cybersecurity operations by using expanded cloud logs in Microsoft 365 tenants. These expanded capabilities, introduced under Microsoft Purview Audit (Standard), allow organizations to access critical event logs, including information about mail activity, user searches, and other actions within services like Exchange Online and SharePoint Online. These logs are particularly valuable for monitoring and analyzing user and admin operations, helping organizations track critical activities across multiple Microsoft services.

The enhanced logs are expected to bolster threat-hunting capabilities, especially in scenarios such as business email compromise (BEC), advanced nation-state cyberattacks, and insider risks. These new logging features provide additional telemetry that can help detect and investigate suspicious activities. By integrating these logs into Security Information and Event Management (SIEM) systems, including Microsoft Sentinel and Splunk, organizations can more effectively track and respond to potential threats.

The introduction of these expanded logging capabilities came in response to a major cybersecurity breach in 2023.

The introduction of these expanded logging capabilities came in response to a major cybersecurity breach in 2023. In that incident, Chinese hackers, identified as Storm-0558, exploited vulnerabilities in Microsoft’s Exchange Online to steal over 60,000 emails from senior U.S. government officials. The hackers gained access to targeted email accounts using stolen authentication tokens, which were forged from a Windows crash dump. Despite evading detection for a period, the breach was eventually uncovered when the State Department’s Security Operations Center (SOC) used enhanced logging capabilities to identify unusual activity.

Following the breach, Microsoft expanded its free logging capabilities for all Purview Audit Standard customers with E3/G3 licenses and above. Previously, detailed logs such as the MailItemsAccessed event were only available to customers with Purview Audit Premium licenses, which had hindered the ability of organizations to detect the attack earlier. The expanded logging, now available to more customers, provides essential information to help prevent similar incidents in the future and strengthens organizations’ overall cybersecurity posture.

Reference:
  • CISA Issues Guidance on Using Expanded Microsoft 365 Cloud Logs
Tags: Cyber NewsCyber News 2025Cyber threatsJanuary 2025
ADVERTISEMENT

Related Posts

Senators Urge CSRB Return For Salt Typhoon

Senators Urge CSRB Return For Salt Typhoon

June 2, 2025
Senators Urge CSRB Return For Salt Typhoon

Authorities Takedown Malware Hiding Tools

June 2, 2025
Senators Urge CSRB Return For Salt Typhoon

Alleged Conti and Trickbot Leader Unmasked

June 2, 2025
Cybersecurity Adds $36M Value Per Project

Cybersecurity Adds $36M Value Per Project

May 30, 2025
Cybersecurity Adds $36M Value Per Project

Funnull Sanctioned In $200M Crypto Scams

May 30, 2025
Cybersecurity Adds $36M Value Per Project

Cerby announced a $40M Series B funding

May 30, 2025

Latest Alerts

Linux Core Dump Flaws Risk Password Leaks

GitHub Code Flaw Replicated By AI Models

Google Script Used In New Phishing Scams

EDDIESTEALER Uses Fake CAPTCHAs for Stealing

Fake AI Apps Drop Ransomware And Malware

OneDrive Flaw Gives Sites Full Data Access

Subscribe to our newsletter

    Latest Incidents

    Covenant Health Cyberattack Shuts Hospitals

    Moscow DDoS Attack Cuts Internet For Days

    Puerto Rico’s Justice Department Cyberattack

    State Actors Hit ConnectWise ScreenConnect

    Ivanti Flaw Hits NHS Staff and Patient Data

    Amalgamated Sugar Data Breach Exposes SSNs

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial