Blog Post

Microsoft Security Community Blog
6 MIN READ

Contextualizing Attacker Activity within Sessions in Exchange Online

Jeff Sun's avatar
Jeff Sun
Former Employee
Jan 03, 2019
Overview   The Exchange audit log is an important tool in the defender toolbox to understand the activity of users (or attackers masquerading as users) in an organization. Defenders can manually ...
Updated Jan 03, 2019
Version 2.0