Guide to Microsoft 365 Security Monitoring: 10 High-Risk Activities

  • Microsoft has expanded audit logs across Exchange Online, SharePoint, and Teams, increasing visibility into critical activity
  • Security teams can now monitor email access, search behavior, messaging activity, and file interactions in greater detail
  • Expanded logs enable earlier detection of suspicious behavior before incidents escalate
  • Broader log coverage supports stronger Microsoft 365 security monitoring without relying solely on reactive alerts
  • When paired with the right detections, expanded logs improve threat response and support compliance efforts

The Challenge: Visibility Without Clear Detections

Native Microsoft 365 logs generate large volumes of data across multiple services. Manually reviewing this activity is time-consuming and often impractical for security teams managing multiple priorities.

Attackers take advantage of this complexity by blending into normal user behavior. They may read emails instead of downloading them, search for sensitive terms, or quietly access Teams content without triggering obvious alerts.

To reduce risk, organizations need a focused approach that highlights the most meaningful security signals across Microsoft 365.

1. Exchange Online: MailItemsAccessed

Attackers who compromise accounts often read emails to gather intelligence, steal sensitive data, or prepare for phishing and business email compromise (BEC) attacks.

Monitor for: 

  • An AppID accessing multiple mailboxes in a short time frame, which may indicate automated data theft
  • Large spikes in mail access activity from a single user, a common sign of account compromise
  • Access to sensitive mailboxes from unusual IPs or devices, suggesting external threat actor activity

2. Exchange Online: Send

Attackers often use a compromised email account to send phishing emails, forward sensitive information, or communicate with other compromised users within an organization.

Monitor for: 

  • Emails sent from known suspicious IP addresses
  • Unusual attachment types, such as password-protected ZIP files
  • Emails sent from accounts that recently logged in at odd hours or from unexpected locations

3. Exchange Online: SearchQueryInitiatedExchange

Attackers frequently search a compromised mailbox for financial data, credentials, or business-critical information to use for further exploitation.

Monitor for:

  • Searches for sensitive terms like “invoice,” “password,” or “wire transfer” by unauthorized users
  • Excessive search activity within a short period, which could indicate reconnaissance behavior
  • Searches originating from devices or IPs not previously associated with the user

4. SharePoint Online: SearchQueryInitiatedSharePoint 

SharePoint and Teams store critical business documents, including financial records, intellectual property, and confidential reports. Attackers search these repositories for valuable information to steal or exploit.

Monitor for:

  • Searches for confidential documents performed outside normal working hours 
  • Queries for sensitive terms by users who are not part of the authorized team or department
  • Repeated searches across multiple SharePoint sites by a single user, potentially indicating an insider threat

5. Microsoft Teams: MeetingParticipantDetail

Unauthorized access to virtual meetings can expose sensitive discussions, provide attackers with reconnaissance opportunities, or facilitate social engineering attacks.

Monitor for:

  • External or unauthorized users joining meetings related to sensitive topics
  • Patterns of participants repeatedly leaving and re-joining meetings, which may suggest  eavesdropping attempts
  • Meeting participant IPs that match known threat actor infrastructure

6. Microsoft Teams: MessageSent 

Attackers often use Teams messages to distribute phishing links, spread malware, or communicate within a compromised organization.

Monitor for:

  • High volumes of messages sent to external or guest users
  • Messages sent during off-hours or from devices that have not been previously used by the sender

7. Microsoft Teams: MessageUpdated

Edited messages can be a sign of tampering, an attempt to cover up malicious activity, or an effort to mislead other users.

Monitor for: 

  • Edits made from unrecognized or suspicious IP addresses
  • Messages that are repeatedly edited within a short timeframe

8. Microsoft Teams: MessageRead

Attackers who gain unauthorized access to an account may read Teams messages to collect intelligence without actively participating in conversations.

Monitor for: 

  • Bulk reading of multiple messages in a single chat thread
  • Message reads from unauthorized applications or devices
  • Messages accessed from IP addresses that do not align with the user’s historical activity

9. Microsoft Teams: ChatRetrieved 

The Graph API can be used to silently retrieve chat metadata, giving attackers insight into internal communications, team structures, and high-value targets.

Monitor for: 

  • Automated retrieval of multiple chat threads by the same AppID
  • Chat retrieval requests from unauthorized or unrecognized applications
  • Patterns that indicate bulk API activity occurring within a short period

10. Microsoft Teams: MessageHostedContentRead

Attackers may extract files, images, or code snippets from Teams channels to gather sensitive data without triggering standard file download alerts.

Monitor for:

  • Access to hosted content by unauthorized external applications
  • Repeated retrievals of hosted content from the same chat or channel
  • Unusual access patterns related to specific content types, such as proprietary code or financial documents

Manually monitoring Microsoft 365 activity at scale is complex. AppOmni simplifies Microsoft 365 security by turning expanded audit logs into actionable detections.

With AppOmni, security teams can:

  • Automate monitoring and alerting for security events across M365 and other SaaS applications, reducing manual work.
  • Apply customizable detection rules without needing complex queries or specialized expertise.
  • Correlate activity across multiple SaaS platforms to identify meaningful patterns and real threats faster.
  • Integrate with SIEM and SOAR solutions to streamline workflows and simplify response efforts.
  • Conduct automated compliance checks that make meeting industry standards like NIST, ISO 27001, and SOC 2 easier.

With built-in expertise, clear guidance, and automation, AppOmni makes securing SaaS environments easier and more effective than ever.

Download Guide to Microsoft 365 Security Monitoring Now.