Close Menu
globalcrimedesk.comglobalcrimedesk.com
    What's Hot

    Why Assad’s Assets Must Fund Syrian Repatriation

    Labour’s delay on conversion practices ban is ‘dangerous’, campaigners say | LGBTQ+ rights

    Famine stalking across Gaza, 500,000 face starvation: Analysis | Israel-Palestine conflict News

    Facebook X (Twitter) Instagram
    Trending
    • Why Assad’s Assets Must Fund Syrian Repatriation
    • Labour’s delay on conversion practices ban is ‘dangerous’, campaigners say | LGBTQ+ rights
    • Famine stalking across Gaza, 500,000 face starvation: Analysis | Israel-Palestine conflict News
    • Birmingham driver jailed for murdering biker who did wheelie
    • Pope Leo calls for journalists to be released from prison
    • AI Code Hallucinations Increase the Risk of ‘Package Confusion’ Attacks
    • Why did Virat Kohli retire from Tests and what does 269 mean? | Cricket News
    • Donald Trump suggestion he will accept luxury plane from Qatar draws criticism from allies and rivals – US politics live | US news
    Facebook X (Twitter) Instagram
    globalcrimedesk.comglobalcrimedesk.com
    • Home
    • Cyber
    • Global
    • Law
    • Mafia
    • Prevention
    • Scandals
    • Terror
    • Trafficking
    globalcrimedesk.comglobalcrimedesk.com
    Home»Cyber»How to capture forensic evidence for Microsoft 365
    Cyber

    How to capture forensic evidence for Microsoft 365

    mediamillion1000@gmail.comBy [email protected]May 11, 2025No Comments1 Min Read
    Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
    Follow Us
    Google News Flipboard
    How to capture forensic evidence for Microsoft 365
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link

    Next you need to create your forensic evidence policies. In the Purview portal, go to “Forensic evidence policies” and select “Create forensic evidence policy.” Specify which activities to capture, such as printing, file exfiltration, specific apps or websites, or all activities for selected users. “All activities” is not a typical setting and is used only for a set period during an investigation. You can also use Microsoft 365 Defender’s Advanced Hunting and Activity Log features for additional forensic analysis.

    Forensic policies for Microsoft 365

    Susan Bradley / CSO

    Caveats and limitations

    Even with these settings, there can be times that you are at the mercy of the vendor. Forensic examinations of cloud assets can be complicated. Tracking through your log files to review what OAuth authentication was abused often takes expert review of these log files. In additional you don’t get memory dumps or full control like you do on endpoints. You often must open a support ticket with your vendor to request log files, thereby delaying your investigation and response.

    There are also budget limitations to be aware of. For example, you may need to purchase additional storage to store the forensic evidence you wish to capture.

    capture Evidence Forensic Microsoft
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
    Previous ArticleNotts v Hampshire, Essex v Yorkshire and more: county cricket – live | County Championship
    Next Article Pope Leo XIV calls for peace in Gaza and Ukraine, saying ‘Never again war’ : NPR
    [email protected]
    • Website

    Related Posts

    AI Code Hallucinations Increase the Risk of ‘Package Confusion’ Attacks

    May 12, 2025

    73% of CISOs admit security incidents due to unknown or unmanaged assets

    May 12, 2025

    So your [expletive] test failed. So %&* what? • The Register

    May 12, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Latest Posts

    Why Assad’s Assets Must Fund Syrian Repatriation

    Labour’s delay on conversion practices ban is ‘dangerous’, campaigners say | LGBTQ+ rights

    Famine stalking across Gaza, 500,000 face starvation: Analysis | Israel-Palestine conflict News

    Birmingham driver jailed for murdering biker who did wheelie

    Trending Posts

    Why Assad’s Assets Must Fund Syrian Repatriation

    May 12, 2025

    Labour’s delay on conversion practices ban is ‘dangerous’, campaigners say | LGBTQ+ rights

    May 12, 2025

    Famine stalking across Gaza, 500,000 face starvation: Analysis | Israel-Palestine conflict News

    May 12, 2025

    Subscribe to News

    Get the latest sports news from NewsSite about world, sports and politics.

    News

    • Cyber
    • Global
    • Law
    • Mafia
    • Prevention

    Company

    • About Us
    • Disclaimer
    • Get In Touch
    • Privacy policy
    • Terms & Condition
    Recent Posts
    • Why Assad’s Assets Must Fund Syrian Repatriation
    • Labour’s delay on conversion practices ban is ‘dangerous’, campaigners say | LGBTQ+ rights

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    © 2025 globalcrimedesk. Designed by Pro.
    Facebook X (Twitter) Pinterest Vimeo WhatsApp TikTok Instagram

    Type above and press Enter to search. Press Esc to cancel.