跳至正文

Microsoft Exchange Online Integration

Overview

Microsoft Exchange Online provides cloud email and calendaring with comprehensive audit and message trace logging. KYRA MDR collects Exchange Online audit logs via the Office 365 Management API for email security monitoring.

Prerequisites

  • A KYRA MDR Collector installed and running
  • Microsoft 365 tenant with Exchange Online
  • Azure AD application with Office 365 Management API permissions
  • Exchange Administrator or Global Administrator role

Configuration

Configure Exchange Online log collection:

  1. Register an application in Azure AD > App Registrations
  2. Grant API permissions:
    • Office 365 Management APIs > ActivityFeed.Read
    • Office 365 Management APIs > ActivityFeed.ReadDlp
  3. Grant admin consent
  4. Configure the KYRA MDR collector:
collector-config.yaml
sources:
- type: exchange-online
tenant_id: <tenant-id>
client_id: <client-id>
client_secret: <client-secret>
content_types:
- Audit.Exchange
- DLP.All
poll_interval: 120s
  1. Restart the collector service

Collected Log Types

Log TypeDescriptionSecurity Use
Mailbox AuditMailbox access and modification eventsEmail compromise detection
Admin AuditExchange admin configuration changesPolicy change monitoring
Message TraceEmail routing and delivery eventsPhishing, spam analysis
DLPData loss prevention policy matchesSensitive data protection
Transport RulesMail flow rule matchesEmail policy enforcement
AuthenticationOutlook and mobile authenticationAccess monitoring

Troubleshooting

No audit events: Exchange Online audit logging is enabled by default for E3/E5. For E1, enable it manually.

Missing mailbox audit: Mailbox audit logging is on by default since January 2019.

Data latency: Office 365 Management API content may have a delay of 12-24 hours.

Contact kyra@seekerslab.com for support.