Connect Office 365 Logs to Azure Sentinel

The Office 365 log connector brings into Azure Sentinel information on ongoing user and admin activities in Exchange and SharePoint (including OneDrive), and now in Teams as well. This information includes details of actions such as file downloads, access requests sent, changes to group events, mailbox operations, Teams events (such as chat, team, member, and channel events), as well as the details of the user who performed the actions. Connecting Office 365 logs to Azure Sentinel enables you to view and analyze this data in your workbooks, query it to create custom alerts, and incorporate it to improve your investigation process, giving you more insight into your Office 365 security.


  • You must have read and write permissions on your Azure Sentinel workspace.

  • You must be a global administrator or security administrator on your tenant.

  • Your Office 365 deployment must be on the same tenant as your Azure Sentinel workspace.


  • In order for the connector to be able to access data through the Office 365 Management Activity API, you must have unified audit logging enabled on your Office 365 deployment. Depending on the type of Office 365 / Microsoft 365 license you have, it may or may not be enabled by default. Consult the Office 365 Security and Compliance Center to check the status of unified audit logging according to your license type.
  • You can also manually enable, disable, and check the current status of Office 365 unified audit logging. For instructions, see Turn Office 365 audit log search on or off.
  • For more information, see the Office 365 Management Activity API reference.


As noted above, and as you'll see on the connector page under Data types, the Azure Sentinel Office 365 connector currently supports the ingestion of audit logs only from Microsoft Exchange and SharePoint (including OneDrive), and now from Teams as well. However, there are some external solutions if you're interested in bringing other Office data into Azure Sentinel.

Enable the Office 365 log connector

Instructions tab

  1. From the Azure Sentinel navigation menu, select Data connectors.

  2. From the Data connectors gallery, select Office 365, and then select Open connector page on the preview pane.

  3. Under the section labeled Configuration, mark the check boxes of the Office 365 activity logs you want to connect to Azure Sentinel, and click Apply Changes.


    If you had previously connected multiple tenants to Azure Sentinel, using an older version of the Office 365 connector which supported this, you will be able to view and modify which logs you collect from each tenant. You will not be able to add additional tenants, but you can remove previously added tenants.

Next steps tab

  • See the recommended workbooks, query samples, and analytics rule templates that are bundled with the Office 365 log connector, to get insight into your SharePoint, OneDrive, Exchange, and Teams log data.

  • To manually query Office 365 log data in Logs, enter OfficeActivity in the first line of the query window.

    • To filter the query for a specific log type, enter | where OfficeWorkload == "<logtype>" in the second line of the query, where <logtype> is either SharePoint, OneDrive, Exchange, or MicrosoftTeams.

Next steps

In this document, you learned how to connect Office 365 to Azure Sentinel. To learn more about Azure Sentinel, see the following articles: