Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

CISA Offers New Cloud Logging Guidance

January 16, 2025
Reading Time: 2 mins read
in News
Apple Opens Information Security Internship

CISA has released guidance aimed at helping government agencies and enterprises enhance their cybersecurity operations by using expanded cloud logs in Microsoft 365 tenants. These expanded capabilities, introduced under Microsoft Purview Audit (Standard), allow organizations to access critical event logs, including information about mail activity, user searches, and other actions within services like Exchange Online and SharePoint Online. These logs are particularly valuable for monitoring and analyzing user and admin operations, helping organizations track critical activities across multiple Microsoft services.

The enhanced logs are expected to bolster threat-hunting capabilities, especially in scenarios such as business email compromise (BEC), advanced nation-state cyberattacks, and insider risks. These new logging features provide additional telemetry that can help detect and investigate suspicious activities. By integrating these logs into Security Information and Event Management (SIEM) systems, including Microsoft Sentinel and Splunk, organizations can more effectively track and respond to potential threats.

The introduction of these expanded logging capabilities came in response to a major cybersecurity breach in 2023.

The introduction of these expanded logging capabilities came in response to a major cybersecurity breach in 2023. In that incident, Chinese hackers, identified as Storm-0558, exploited vulnerabilities in Microsoft’s Exchange Online to steal over 60,000 emails from senior U.S. government officials. The hackers gained access to targeted email accounts using stolen authentication tokens, which were forged from a Windows crash dump. Despite evading detection for a period, the breach was eventually uncovered when the State Department’s Security Operations Center (SOC) used enhanced logging capabilities to identify unusual activity.

Following the breach, Microsoft expanded its free logging capabilities for all Purview Audit Standard customers with E3/G3 licenses and above. Previously, detailed logs such as the MailItemsAccessed event were only available to customers with Purview Audit Premium licenses, which had hindered the ability of organizations to detect the attack earlier. The expanded logging, now available to more customers, provides essential information to help prevent similar incidents in the future and strengthens organizations’ overall cybersecurity posture.

Reference:
  • CISA Issues Guidance on Using Expanded Microsoft 365 Cloud Logs
Tags: Cyber NewsCyber News 2025Cyber threatsJanuary 2025
ADVERTISEMENT

Related Posts

EU Plans Biometric Checks for Visitors

EU Plans Biometric Checks for Visitors

August 4, 2025
EU Plans Biometric Checks for Visitors

Flo Settles Data‑Sharing Lawsuit

August 4, 2025
EU Plans Biometric Checks for Visitors

Russia Mobile Internet Shutdowns Spike

August 4, 2025
CISA Releases Thorium for Malware Analysis

CISA Releases Thorium for Malware Analysis

August 1, 2025
CISA Releases Thorium for Malware Analysis

Canadian Criminal Sentenced for NFT Theft

August 1, 2025
CISA Releases Thorium for Malware Analysis

Russia Blocks US‑Made Speedtest Over Security

August 1, 2025

Latest Alerts

Fake OAuth Apps Breach Microsoft 365

Akira Hits SonicWall VPNs in Zero‑Day

PlayPraetor Trojan Android Devices

Dahua Camera Flaws Enable Remote Hacking

NOVABLIGHT Steals Logins and Crypto

PyPI Warns of Email Phishing Attack

Subscribe to our newsletter

    Latest Incidents

    Hackers Leak Alleged Aeroflot Data

    Luxembourg Probes Huawei Tech Outage

    Dermatology Clinics Hit by Data Breach

    Everest Ransomware Hits Mailchimp

    Cyberattack Hits French Natural History Museum

    Russia Faces Second Major Cyberattack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial