Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

CISA Offers New Cloud Logging Guidance

January 16, 2025
Reading Time: 2 mins read
in News
Apple Opens Information Security Internship

CISA has released guidance aimed at helping government agencies and enterprises enhance their cybersecurity operations by using expanded cloud logs in Microsoft 365 tenants. These expanded capabilities, introduced under Microsoft Purview Audit (Standard), allow organizations to access critical event logs, including information about mail activity, user searches, and other actions within services like Exchange Online and SharePoint Online. These logs are particularly valuable for monitoring and analyzing user and admin operations, helping organizations track critical activities across multiple Microsoft services.

The enhanced logs are expected to bolster threat-hunting capabilities, especially in scenarios such as business email compromise (BEC), advanced nation-state cyberattacks, and insider risks. These new logging features provide additional telemetry that can help detect and investigate suspicious activities. By integrating these logs into Security Information and Event Management (SIEM) systems, including Microsoft Sentinel and Splunk, organizations can more effectively track and respond to potential threats.

The introduction of these expanded logging capabilities came in response to a major cybersecurity breach in 2023.

The introduction of these expanded logging capabilities came in response to a major cybersecurity breach in 2023. In that incident, Chinese hackers, identified as Storm-0558, exploited vulnerabilities in Microsoft’s Exchange Online to steal over 60,000 emails from senior U.S. government officials. The hackers gained access to targeted email accounts using stolen authentication tokens, which were forged from a Windows crash dump. Despite evading detection for a period, the breach was eventually uncovered when the State Department’s Security Operations Center (SOC) used enhanced logging capabilities to identify unusual activity.

Following the breach, Microsoft expanded its free logging capabilities for all Purview Audit Standard customers with E3/G3 licenses and above. Previously, detailed logs such as the MailItemsAccessed event were only available to customers with Purview Audit Premium licenses, which had hindered the ability of organizations to detect the attack earlier. The expanded logging, now available to more customers, provides essential information to help prevent similar incidents in the future and strengthens organizations’ overall cybersecurity posture.

Reference:
  • CISA Issues Guidance on Using Expanded Microsoft 365 Cloud Logs
Tags: Cyber NewsCyber News 2025Cyber threatsJanuary 2025
ADVERTISEMENT

Related Posts

New EU Vulnerability Database Launched

New EU Vulnerability Database Launched

May 14, 2025
Google Hunts Malicious Linux Desktop Files

Aussie Data Breach Reports Hit 5 Year High

May 14, 2025
Google Hunts Malicious Linux Desktop Files

Google Hunts Malicious Linux Desktop Files

May 14, 2025
DoppelPaymer Ransomware Suspect Apprehended

Hackers Trade Nearly $2 Billion in Japan

May 13, 2025
DoppelPaymer Ransomware Suspect Apprehended

New UK Law for Enterprise IoT Security

May 13, 2025
DoppelPaymer Ransomware Suspect Apprehended

DoppelPaymer Ransomware Suspect Apprehended

May 13, 2025

Latest Alerts

Microsoft Defender Bug Allows SYSTEM Access

Uncanny Automator Bug Risks WordPress Sites

Devs Hit By PyPI Solana Token Secret Theft

Hackers Exploit Output Messenger Zero-Day

ASUS Fixes Critical Flaws in DriverHub

Apple Fixes Critical Bugs in iOS and MacOS

Subscribe to our newsletter

    Latest Incidents

    Alabama Cybersecurity Event Hits Services

    Andy Frain Data Breach Impacts 100k People

    Hong Kong DSC Hit By Ransomware Attack

    Alleged Steam Breach Exposes 89M Records

    Ulhasnagar Municipal Corporation Hacked

    Madison County Iowa Systems Disrupted

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial