Search the audit log for events in Microsoft Teams
The Microsoft Teams admin center is gradually replacing the Skype for Business admin center, and we're migrating Teams settings to it from the Microsoft 365 admin center. If a setting has been migrated, you'll see a notification and then be directed to the setting's location in the Teams admin center. For more information, see Manage Teams during the transition to the Teams admin center.
The audit log can help you investigate specific activities across Microsoft 365 services. For Microsoft Teams, here are some of the activities that are audited:
- Team creation
- Team deletion
- Added channel
- Changed setting
Audit events from private channels are also logged as they are for teams and standard channels.
Turn on auditing in Teams
Audit data is only available from the point at which you turned on auditing.
Retrieve Teams data from the audit log
- To retrieve audit logs, go to the Security & Compliance Center. Under Search, select Audit log search.
- Use Search to filter by the activities, dates, and users you want to audit.
- Export your results to Excel for further analysis.
Audit data is only visible in the audit log if auditing is turned on.
The length of time that an audit record is retained and searchable in the audit log depends on your Microsoft 365 or Office 365 subscription, and specifically the type of license that's assigned to users. To learn more, see the Security & Compliance Center service description.
Tips for searching the audit log
Here are tips for searching for Teams activities in the audit log.
- You can select specific activities to search for by clicking the activity name. Or you can search for all activities in a group (such as File and folder activities) by clicking the group name. If an activity is selected, you can click it to cancel the selection. You can also use the search box to display the activities that contain the keyword that you type.
- To display events for activities run using cmdlets, select Show results for all activities in the Activities list. If you know the name of the operation for these activities, search for all activities, and then filter the results by typing the name of the operation in the box in the Activity column. To learn more, see Step 3: Filter the search results.
- To clear the current search criteria, click Clear. The date range returns to the default of the last seven days. You can also click Clear all to show results for all activities to cancel all selected activities.
- If 5,000 results are found, you can probably assume that there are more than 5,000 events that met the search criteria. You can refine the search criteria and rerun the search to return fewer results, or you can export all the search results by selecting Export results > Download all results.
Check out this video for using audio log search. Join Ansuman Acharya, a program manager for Teams, as he demonstrates how to do an audit log search for Teams.
Use Cloud App Security to set activity policies
Using Microsoft Cloud App Security integration, you can set activity policies to enforce a wide range of automated processes using the app provider's APIs. These policies enable you to monitor specific activities carried out by various users, or follow unexpectedly high rates of one certain type of activity.
After you set an activity detection policy, it starts to generate alerts. Alerts are only generated on activities that occur after you create the policy. Here's some example scenarios for how you can use activity policies in Cloud App Security to monitor Teams activities.
External user scenario
One scenario you might want to keep an eye on, from a business perspective, is the addition of external users to your Teams environment. If external users are enabled, monitoring their presence is a good idea. You can use Cloud App Security to identify potential threats.
The screenshot of this policy to monitor adding external users allows you to name the policy, set the severity according to your business needs, set it as (in this case) a single activity, and then establish the parameters that will specifically monitor only the addition of non-internal users, and limit this activity to Teams.
The results from this policy can be viewed in the activity log:
Here you can review matches to the policy you've set, and make any adjustments as needed, or export the results to use elsewhere.
Mass delete scenario
As mentioned earlier, you can monitor deletion scenarios. It's possible to create a policy that would monitor mass deletion of Teams sites. In this example, an alert-based policy is set up to detect mass deletion of teams in a span of 30 minutes.
As the screenshot shows, you can set many different parameters for this policy to monitor Teams deletions, including severity, single or repeated action, and parameters limiting this to Teams and site deletion. This can be done independently of a template, or you may have a template created to base this policy on, depending on your organizational needs.
Once you've established a policy that will work for your business, you can then review the results in the activity log as events are triggered:
You can filter down to the policy you've set to see the results of that policy. If the results you're getting in the activity log are not satisfactory (maybe you're seeing lots of results, or nothing at all), this may help you to fine-tune the query to make it more relevant to what you need it to do.
Alert and governance scenario
You can set alerts and send emails to admins and other users when an activity policy is triggered. You can set automated governance actions such as suspending a user or making a user to sign in again in an automated way. This example shows how a user account can be suspended when an activity policy is triggered and determines a user deleted two or more teams in 30 minutes.
Use Cloud App Security to set anomaly detection policies
Anomaly detection policies in Cloud App Security provide out-of-the-box user and entity behavioral analytics (UEBA) and machine learning (ML) so that you can immediately run advanced threat detection across your cloud environment. Because they're automatically enabled, the new anomaly detection policies provide immediate results by providing immediate detections, targeting numerous behavioral anomalies across your users and the machines and devices connected to your network. Additionally, the new policies expose more data from the Cloud App Security detection engine, to help you speed up the investigation process and contain ongoing threats.
We're working to integrate Teams events into anomaly detection policies. For now, you can set up anomaly detection policies for other Office products and take action items on users who match those policies.
Here's a list of all events that are logged for user and admin activities in Teams in the Microsoft 365 audit log. The table includes the friendly name that's displayed in the Activities column and the name of the corresponding operation that appears in the detailed information of an audit record and in the CSV file when you export the search results.
|Added bot to team||BotAddedToTeam||A user adds a bot to a team.|
|Added channel||ChannelAdded||A user adds a channel to a team.|
|Added connector||ConnectorAdded||A user adds a connector to a channel.|
|Added members||MemberAdded||A team owner adds members to a team, channel, or group chat.|
|Added tab||TabAdded||A user adds a tab to a channel.|
|Changed channel setting||ChannelSettingChanged||The ChannelSettingChanged operation is logged when the following activities are performed by a team member. For each of these activities, a description of the setting that was changed (shown in parentheses is displayed in the Item column in the audit log search results.
|Changed organization setting||TeamsTenantSettingChanged||The TeamsTenantSettingChanged operation is logged when the following activities are performed by a global admin in the Microsoft 365 admin center. These activities affect org-wide Teams settings. To learn more, see Manage Teams settings for your organization.
For each of these activities, a description of the setting that was changed (shown in parentheses) is displayed in the Item column in the audit log search results.
|Changed role of members in team||MemberRoleChanged||A team owner changes the role of members in a team. The following values indicate the role type assigned to the user.
1 - Indicates the Owner role.
2 - Indicates the Member role.
3 - Indicates the Guest role.
The Members property also includes the name of your organization and the member's email address.
|Changed team setting||TeamSettingChanged||The TeamSettingChanged operation is logged when the following activities are performed by a team owner. For each of these activities, a description of the setting that was changed (shown in parentheses) is displayed in the Item column in the audit log search results.
|Created team||TeamCreated||A user creates a team.|
|Deleted all organization apps||DeletedAllOrganizationApps||Deleted all organization apps from the catalog.|
|Deleted app||AppDeletedFromCatalog||An app has been deleted from the catalog.|
|Deleted channel||ChannelDeleted||A user deletes a channel from a team.|
|Deleted team||TeamDeleted||A team owner deletes a team.|
|Installed app||AppInstalled||An app was installed.|
|Performed action on card||PerformedCardAction||A user took action on an adaptive card within a chat. Adaptive cards are typically used by bots to allow the rich display of information and interaction in chats.
Note: Only inline input actions on an adaptive card inside a chat will be available in the audit log. For example, when a user submits a poll response in a channel conversation on an adaptive card generated by a Poll bot. User actions such as "View result", which will open a dialog, or user actions inside dialogs won't be available in the audit log.
|Published app||AppPublishedToCatalog||An app was added to the catalog.|
|Removed bot from team||BotRemovedFromTeam||A user removes a bot from a team.|
|Removed connector||ConnectorRemoved||A user removes a connector from a channel.|
|Removed members||MemberRemoved||A team owner removes members from a team, channel, or group chat.|
|Removed tab||TabRemoved||A user removes a tab from a channel.|
|Uninstalled app||AppUninstalled||An app was uninstalled.|
|Updated app||AppUpdatedInCatalog||An app was updated in the catalog.|
|Updated connector||ConnectorUpdated||A user modified a connector in a channel.|
|Updated tab||TabUpdated||A user modified a tab in a channel.|
|Upgraded app||AppUpgraded||An app was upgraded to its latest version in the catalog.|
|User signed in to Teams||TeamsSessionStarted||A user signs in to a Microsoft Teams client. This event doesn't capture token refresh activities.|
Shifts in Teams activities
If your organization is using the Shifts app in Teams, you can search the audit log for activities related to the Shifts app. Here's a list of all events that are logged for Shifts activities in Teams in the Microsoft 365 audit log.
|Added scheduling group||SchedulingGroupAdded||A user successfully adds a new scheduling group to the schedule.|
|Edited scheduling group||SchedulingGroupEdited||A user successfully edits a scheduling group.|
|Deleted scheduling group||SchedulingGroupDeleted||A user successfully deletes a scheduling group from the schedule.|
|Added shift||ShiftAdded||A user successfully adds a shift.|
|Edited shift||ShiftEdited||A user successfully edits a shift.|
|Deleted shift||ShiftDeleted||A user successfully deletes a shift.|
|Added time off||TimeOffAdded||A user successfully adds time off on the schedule.|
|Edited time off||TimeOffEdited||A user successfully edits time off.|
|Deleted time off||TimeOffDeleted||A user successfully deletes time off.|
|Added open shift||OpenShiftAdded||A user successfully adds an open shift to a scheduling group.|
|Edited open shift||OpenShiftEdited||A user successfully edits an open shift in a scheduling group.|
|Deleted open shift||OpenShiftDeleted||A user successfully deletes an open shift from a scheduling group.|
|Shared schedule||ScheduleShared||A user successfully shared a team schedule for a date range.|
|Clocked in using Time clock||ClockedIn||A user successfully clocks in using Time clock.|
|Clocked out using Time clock||ClockedOut||A user successfully clocks out using Time clock.|
|Started break using Time clock||BreakStarted||A user successfully starts a break during an active Time clock session.|
|Ended break using Time clock||BreakEnded||A user successfully ends a break during an active Time clock session.|
|Added Time clock entry||TimeClockEntryAdded||A user successfully adds a new manual Time clock entry on Time Sheet.|
|Edited Time clock entry||TimeClockEntryEdited||A user successfully edits a Time clock entry on Time Sheet.|
|Deleted Time clock entry||TimeClockEntryDeleted||A user successfully deletes a Time clock entry on Time Sheet.|
|Added shift request||RequestAdded||A user added a shift request.|
|Responded to shift request||RequestRespondedTo||A user responded to a shift request.|
|Canceled shift request||RequestCanceled||A user canceled a shift request.|
|Changed schedule setting||ScheduleSettingChanged||A user changes a setting in Shifts settings.|
|Added workforce integration||WorkforceIntegrationAdded||The Shifts app is integrated with a third-party system.|
|Accepted off shift message||OffShiftDialogAccepted||A user acknowledges the off-shift message to access Teams after shift hours.|
Office 365 Management Activity API
You can use the Office 365 Management Activity API to retrieve information about Teams events. To learn more about the Management Activity API schema for Teams, see Teams schema.