Audit
Microsoft Purview Audit is your organization's activity recorder for Microsoft 365. Every user action, admin change, and system event is captured in the Unified Audit Log—providing the visibility you need for security investigations, compliance reporting, and forensic analysis.
What is Audit?
Audit captures activity across all Microsoft 365 workloads:
| Workload | Examples of Logged Activities |
|---|---|
| Exchange Online | Emails sent, mailbox access, delegate actions |
| SharePoint/OneDrive | File views, downloads, shares, permission changes |
| Teams | Channel creation, meeting joins, message deletes |
| Entra ID | Sign-ins, password changes, group modifications |
| Purview | Label applications, DLP matches, eDiscovery actions |
Audit vs. Audit (Premium)
| Capability | Audit (Standard) | Audit (Premium) |
|---|---|---|
| Log Retention | 180 days | 1 year (up to 10 years) |
| MailItemsAccessed | Forensic mailbox auditing | |
| Search API | Basic | High-bandwidth access |
| Intelligent Insights | Crucial event identification | |
| License | E3/A3 | E5/A5 |
MailItemsAccessed events are essential for breach investigations. Without Premium, you can see who logged in but not what emails they read. This is critical for determining data exposure in security incidents.
Key Use Cases
Security Investigations
Trace user activity during suspected account compromise. See exactly what files were accessed, emails read, and actions taken.
Compliance Reporting
Generate audit reports for regulatory requirements. Demonstrate who accessed sensitive data and when.
️ Insider Threat Detection
Feed audit data to Insider Risk Management for behavioral analytics and anomaly detection.
️ Legal Discovery
Provide activity evidence for eDiscovery cases. Audit logs complement content preservation.
Quick Links
| Resource | Description |
|---|---|
| Microsoft Purview Audit | Search the audit log |
| Audit Log Activities | Complete activity reference |
| Implementation Guide | Enterprise deployment guide |
Related Solutions
- Insider Risk Management — Uses audit data for behavioral analytics
- eDiscovery — Combines audit logs with content for investigations
- DSPM — Monitors sensitive data access patterns