Overview
Global Administrators of Microsoft 365 can configure their productivity suite to send Office 365 unified audit logs to Blumira for threat detection. Blumira then intelligently analyzes those logs to automatically detect suspected threats, notify you of those threats, and provide you with an actionable response.
Note: Data is collected from the time of a successful integration configuration onward and includes data from up to 7 days prior to the integration.
Before you begin
Verify that your tenant license includes Auditing before continuing with the steps below.
Reference: See the list of licenses that meet this requirement in Auditing solutions in Microsoft Purview. Audit Premium provides the most event data to Blumira.
Before you can add the Microsoft 365 Cloud Connector in Blumira, you must gather three credentials from your Azure Active Directory admin center:
- Application (client) ID
- Directory (tenant) ID
- Client secret value
You can gather these credentials by either running the script provided in Step 5, below, or completing the manual procedure in Manually gathering your credentials.
Enabling auditing and gathering your Microsoft credentials
To enable auditing and quickly gather your credentials for the Blumira Cloud Connector, complete the following steps:
- Verify that you are a Global Admin in Microsoft 365.
Important: If you are not a Global Admin, you will not be able to send logs to Blumira. - Log in to https://compliance.microsoft.com.
- In the left navigation pane of the compliance portal, click Audit.
- To enable auditing, click Start recording user and admin activity.
Note: It might take up to 60 minutes for the change to take effect.
Reference: See Microsoft's Use the compliance center to turn on auditing for more information. - To automatically register the application and gather the credentials you need for your Blumira Cloud Connector, run the script below in an elevated PowerShell window and ensure that you replace "5aa4588c-xxxx-xxxx-xxxx-xxxxxxxxxx" with your Tenant ID, which you can find in the Azure AD portal, and "domain.com" with your organization's domain.
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; . { iwr -useb http://dl.blumira.com/m365_az_setup_app.ps1 }| iex; Blumira-M365-Installer -tenantId 5aa4588c-xxxx-xxxx-xxxx-xxxxxxxxxx -domain "domain.com"
Note: If you are unable to run this script, you can instead complete the steps in Manually gathering your Microsoft credentials, below. - After the script is done running, you can copy these values from the script's output and paste them into Blumira's Add Cloud Connector window:
- Client ID
- Tenant ID
- Client Secret
Manually gathering your Microsoft credentials
If you cannot use the script provided above to automatically register the application and gather your credentials, you can instead complete these manual steps in your Microsoft admin center:
- Ensure that you have completed Steps 1 - 4 above.
- Log in to Microsoft Entra admin center.
- On the left side menu, under Identity, expand Applications.
- Click App Registrations.
- Click Register an application or + New registration.
- Type the name (e.g., Microsoft 365 Audit Logs to Blumira).
- Under Supported Account Types, select Accounts in this organizational directory only, and then click Register.
- Copy and save the Application (client) ID and the Directory (tenant) ID to be used in later steps.
- In the second-to-left panel, click API permissions.
- Click Add a Permission.
- Click Office 365 Management API.
- Click Application Permissions.
- Expand ActivityFeed, and select the check boxes next to ActivityFeed.Read and ActivityFeed.ReadDlp.
- At the bottom, click Add permissions.
- In API permissions, click Microsoft Graph.
- Click Application Permissions.
- In the search box, type User.
- Click User to expand the options and select the check box next to User.Read.All.
- Click Add permissions.
-
Important: Click Grant admin consent below Configured permissions.
- In the Status column, confirm that Admin consent was granted (a green check mark appears):
- Click Certificates & secrets.
- Click New client secret.
- In the Description box, type a descriptive name (e.g., Blumira sensor).
- Select any timeframe that you’re comfortable with (up to 24 months), and then click Add.
Tip: Ensure that you set yourself a reminder to update this when it expires. - From the Value column under Client secrets, copy the client secret value to be used in later steps.
Important: Do not copy the “Secret ID,” which is only an object reference to the value and will not allow Blumira to collect logs.
Configuring the Microsoft 365 Cloud Connector
Note: There can be approximately one minute of latency between when Microsoft generates a Client secret and when it successfully works in an API request. Wait at least one minute after generating the client secret before proceeding with the steps below in Blumira.
Cloud Connectors automate the configuration of your integrations without requiring you to use a sensor. After you obtain your integration's configuration parameters, you can then enable Blumira to collect your logs.
To configure the Blumira Cloud Connector:
- In the Blumira app, navigate to Settings > Cloud Connectors.
- Click + Add Cloud Connector.
- In the Available Cloud Connectors window, click the connector that you want to add.
- If you want to change the name of the connector, type the new name in the Cloud Connector Name box.
- Enter the credentials that you collected in the previous steps.
- Click Connect.
- On the Cloud Connectors screen, under Current Status, you can view the configuration’s progress. When the configuration completes, the status changes to Online (green dot).
Important: If you previously deployed a sensor module for this integration, then you must remove it via the Sensors page (Settings > Sensors) to avoid log duplication.
Note: Sometimes, it can take over 3 hours before Microsoft audit logging (Step 2 of the "Before you begin" section above) is truly enabled. In these instances, you will see an error in the Cloud Connector in Blumira: "Error: Please make sure that Unified Audit Logging is enabled." If you are certain that auditing has been enabled, it is likely that a system delay in Microsoft is causing the error.
Running a log test with Microsoft 365
Check to see that Blumira is successfully receiving your Microsoft 365 logs by running a simple test: create a new rule in Outlook 365. Whenever a new Outlook rule is created, Blumira will generate a new finding in your account and trigger an alert.
Follow these steps to run a test:
- Log in to Microsoft 365.
- Navigate to Outlook 365.
- Click Settings in the left sidebar.
- Click Add New Rule.
- Create a new rule and call it something like "Test Blumira."
- Refresh your Blumira Summary Dashboard.
- Locate and work the finding.