Microsoft 365 Integration
Overview
This integration collects Azure AD sign-in events, Exchange mail flow rules, SharePoint file access, OneDrive activity, and Microsoft Defender alerts via the Office 365 Management Activity API and Microsoft Graph API.
Supported services: Exchange Online, SharePoint, OneDrive, Teams, Azure AD
Prerequisites
- A KYRA MDR Collector installed and running (Installation Guide)
- Microsoft 365 Business Basic plan or higher
- Azure AD admin access to register an application and grant API permissions
Configuration
Step 1: Register an Azure AD Application
- Log in to the Azure Portal
- Navigate to Azure Active Directory > App registrations > New registration
- Register the application and note the Application (client) ID and Tenant ID
- Create a client secret under Certificates & secrets
Step 2: Grant API Permissions
Grant the following permissions to the registered application:
ActivityFeed.Read(Office 365 Management APIs)AuditLog.Read.All(Microsoft Graph)SecurityEvents.Read.All(Microsoft Graph)
Step 3: Enable Activity Feed Subscriptions
POST https://manage.office.com/api/v1.0/{tenant_id}/activity/feed/subscriptions/startContent-Type: application/json{ "contentType": "Audit.AzureActiveDirectory" }Repeat for: Audit.Exchange, Audit.SharePoint, Audit.General, DLP.All
Step 4: Provide Credentials to KYRA MDR
Enter the Tenant ID, Client ID, and Client Secret in the KYRA MDR integration settings.
Collected Log Types
| Log Type | Security Use | Priority |
|---|---|---|
| Azure AD sign-ins | Account takeover, brute force detection | Critical |
| MFA events | MFA fatigue attack detection | High |
| Exchange forwarding rules | Business email compromise (BEC) | Critical |
| SharePoint external sharing | Data exfiltration detection | High |
| OneDrive bulk download | Pre-resignation data theft | High |
| Teams guest additions | Unauthorized external access | Medium |
| Defender alerts | Malware detection | Critical |
| Admin role changes | Privilege escalation detection | Critical |
| DLP events | Sensitive data leak prevention | High |
Troubleshooting
No Events Received
- Verify the Azure AD app has the correct permissions and admin consent
- Confirm the activity feed subscriptions are active
- Check that the Client Secret has not expired
Partial Logs
- Ensure all content types (
Audit.Exchange,Audit.SharePoint, etc.) have active subscriptions - Some log types require Microsoft 365 E5 or Defender for Office 365 licenses
For additional help, contact kyra@seekerslab.com.