Customize Audit Logs Collection
This section describes how to customize the Audit Logs collection using Syskit Point.
Audit logs can provide you with insights into all activities related to the user and administration activities in your Microsoft 365 environment. The Audit Logs contain information on activities within your organization related to groups, documents, permissions, directory services, and much more.
Users that are assigned Syskit Point Admin role can configure activities that are going to be collected in these locations:
- Syskit Point Registration > Tenant settings
- Audit Logs section in Settings
After registering Syskit Point, on the Connect tenant step, you have the following audit options on disposal:
- Store audit logs (1)
- Protect user privacy (2)
Connect Tenant step
Please note! You can change these settings by managing your tenant connection in Settings > General > Connected Tenant.
By default, the Store audit logs option is enabled, meaning that Syskit Point will process and store the audit logs to your Azure Cosmos DB account.
Tip! You can change the Audit Logs settings after the initial connection by managing your tenant connection in Settings > General > Connected Tenant.
Turning this option on results in the following:
- User activity data, such as file and permissions changes, will be hidden and protected from Administrator supervision
- User Activity report will be hidden from Syskit Point user interface
- Access to the File and Page Activities report will be hidden
- Summary data in the Analytics & Usage tile will remain visible but cannot be drilled to access data for a specific user
- User activity data will, however, be collected and stored
Please note! User activity data continues to be collected and stored to be readily available, if needed, in case of a security incident.
The following rules apply regarding the User Privacy option:
- By default, this option is turned off
- The option can be set for each tenant connected with Syskit Point independently
- Changing the option is possible through the Manage Connection button in the Syskit Point Settings > General > Connected Tenant screen
Please note! The Protect user privacy option is disabled automatically if the Store audit logs option is turned off.
Audit log settings can also be configured after the initial configuration of Syskit Point. To do so:
- Open the Settings screen
- Navigate to the Audit > Audit Logs (1) page
Here, you can:
- Turn the storage of Audit Logs on or off (2)
- Select activities to collect (3)
- View the number of events (4) in the Audit Index
Audit Logs Settings
Audit logs activities that are being collected can be found by clicking the Select activities to collect (3) link.
A new dialog opens, showing all audit log categories and activities available in Syskit Point. Here you can:
- Use the Select All option to enable the collection of all available activities (1)
- Adjust which audit log categories will be collected by clicking the checkbox (2) next to a category
- Expand categories (3)
- Mark only specific activities within a category to be collected (4)
- Confirm your changes by clicking the OK button (5) and Save button on the Audit Logs screen.
Select activities to collect screen
Available audit log categories:
- Application administration activities
- Azure AD group administration activities
- Data governance
- Directory administration activities
- Exchange admin activities
- Exchange mailbox activities
- File and page activities
- Folder activities
- Microsoft Forms
- Microsoft Power Automate
- Microsoft Stream
- Microsoft Teams activities
- Power Apps activities
- Power BI activities
- Role administration activities
- SharePoint list events
- Sharing and access request activities
- Site administration activities
- Site permissions activities
- Synchronization activities
- User activities
- User administration activities
Data retention is limited to only 1 year with Syskit Point Cloud.
Due to that, there are no settings or options for you to modify it. This applies to the Management, Security & Compliance, and Governance plans. For more details on Syskit Point plans that are currently available, check the pricing page.
When audit log data retention is enabled and set up, Syskit Point will delete audit logs that are older than the specified timeframe.
This option is disabled by default.
Go to the General Settings screen in your Syskit Point to enable it.
- Navigate to the Audit section > Audit Logs (1) page
- Select the checkbox next to Remove old audit Logs from Syskit (2)
- Choose the amount of time (3) that should pass for audit logs to be deleted
- Once set up, audit logs that are older than the timeframe you select will be deleted
- Click Save (4) to finalize
Data retention for audit logs
Please note! By default, Exchange logs are not collected; at least one Exchange activity must be selected for Syskit Point to start collecting and storing Exchange log data.
To select Exchange activities:
- Open the Select activities to collect dialog in Audit settings
- Choose from two available categories:
- Exchange admin activities (1)
- Exchange mailbox activities (2)
- Click OK to confirm
Exchange log categories
Please note! It can take up to 30 minutes for Syskit Point to collect Exchange log data.
To view collected Exchange logs, use the Exchange Logs report available in the Report Center.
Syskit Point collects audit logs accessible in the unified audit log. Out of the box, you can review the audit logs from the Microsoft 365 compliance center. You can additionally customize for which activities Syskit Point will collect audit logs.
Azure Active Directory shows all sing-ins performed by users, service principals, apps, and Azure resources. Syskit Point does not collect Azure Active Directory sign-in logs. Syskit Point collects unified audit logs, which contain a subset of said logs related to Microsoft 365 and are visible in the Microsoft 365 compliance center.
Syskit Point checks for and collects new audit logs every 15 minutes. Note that it can take up to 24 hours after an event occurs for the corresponding audit log record to be returned in the results of an audit log search.