πŸ”’ Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided SC-200 Domain 2
Domain 2 β€” Module 10 of 10 100%
22 of 28 overall

SC-200 Study Guide

Domain 1: Manage a Security Operations Environment

  • Sentinel Workspace: Roles & Retention
  • Get Windows Events Into Sentinel
  • Syslog, CEF & Azure Data Ingestion
  • Defender for Endpoint: Core Setup
  • Attack Surface Reduction & Security Policies
  • Defender XDR: Tune Your Alerts
  • Automated Investigation & Attack Disruption
  • Sentinel Automation: Rules & Playbooks
  • Custom Detections in Defender XDR
  • Sentinel Analytics & Threat Intelligence
  • MITRE ATT&CK & Anomaly Detection
  • Detection Engineering: Putting It All Together

Domain 2: Respond to Security Incidents

  • Incident Triage: From Alert to Verdict Free
  • Purview & Defender for Cloud Threats
  • Identity Threats: Entra & Defender for Identity
  • Cloud App Security: Investigate Shadow IT
  • Sentinel Incident Response
  • Copilot for Security: Your AI Analyst
  • Complex Attacks & Lateral Movement
  • Endpoint: Timeline & Live Response
  • Endpoint: Evidence & Entity Investigation
  • M365 Investigations: Audit, Search & Graph

Domain 3: Perform Threat Hunting

  • KQL Foundations for Threat Hunters Free
  • Advanced Hunting in Defender XDR Free
  • Sentinel Hunting: Build & Monitor Queries
  • Threat Analytics & Hunting Graphs
  • Data Lake: KQL Jobs & Summary Rules
  • Notebooks & the Sentinel MCP Server

SC-200 Study Guide

Domain 1: Manage a Security Operations Environment

  • Sentinel Workspace: Roles & Retention
  • Get Windows Events Into Sentinel
  • Syslog, CEF & Azure Data Ingestion
  • Defender for Endpoint: Core Setup
  • Attack Surface Reduction & Security Policies
  • Defender XDR: Tune Your Alerts
  • Automated Investigation & Attack Disruption
  • Sentinel Automation: Rules & Playbooks
  • Custom Detections in Defender XDR
  • Sentinel Analytics & Threat Intelligence
  • MITRE ATT&CK & Anomaly Detection
  • Detection Engineering: Putting It All Together

Domain 2: Respond to Security Incidents

  • Incident Triage: From Alert to Verdict Free
  • Purview & Defender for Cloud Threats
  • Identity Threats: Entra & Defender for Identity
  • Cloud App Security: Investigate Shadow IT
  • Sentinel Incident Response
  • Copilot for Security: Your AI Analyst
  • Complex Attacks & Lateral Movement
  • Endpoint: Timeline & Live Response
  • Endpoint: Evidence & Entity Investigation
  • M365 Investigations: Audit, Search & Graph

Domain 3: Perform Threat Hunting

  • KQL Foundations for Threat Hunters Free
  • Advanced Hunting in Defender XDR Free
  • Sentinel Hunting: Build & Monitor Queries
  • Threat Analytics & Hunting Graphs
  • Data Lake: KQL Jobs & Summary Rules
  • Notebooks & the Sentinel MCP Server
Domain 2: Respond to Security Incidents Premium ⏱ ~12 min read

M365 Investigations: Audit, Search & Graph

When the investigation leads into Microsoft 365, you need three tools: Purview Audit for user activity, Content Search for finding data, and Microsoft Graph activity logs for admin operations.

The M365 investigation toolkit

β˜• Simple explanation

Your investigation has traced the attack to Microsoft 365. The attacker used a compromised account to read emails, access SharePoint files, and change admin settings. Now you need to find exactly what they did.

Three tools help you investigate M365 activity:

  • Purview Audit β€” who did what, when, and where across M365 services
  • Content Search β€” find specific emails, files, or Teams messages matching your criteria
  • Microsoft Graph activity logs β€” what API calls were made (especially by apps and automations)

Purview Audit captures a comprehensive record of user and admin activities across Microsoft 365 β€” Exchange, SharePoint, OneDrive, Teams, Entra ID, and more. It supports both Standard Audit (default, 180-day retention) and Premium Audit (1-year retention with advanced events).

Content Search in Microsoft Purview enables location-based searches across Exchange mailboxes, SharePoint sites, OneDrive accounts, and Teams messages to find specific content relevant to an investigation.

Microsoft Graph activity logs record all API requests made to Microsoft Graph, providing visibility into app-level operations β€” critical for investigating OAuth-based attacks, automation abuse, and administrative API calls.

Purview Audit

What Audit captures

ServiceExample Events
Exchange OnlineEmail sent, received, deleted, forwarded; mailbox permission changes; inbox rules created
SharePoint / OneDriveFiles viewed, downloaded, shared, deleted; site permission changes
TeamsMessages sent, deleted; meetings created; guest access changes
Entra IDSign-ins, password resets, MFA registrations, group membership changes
Power PlatformPower Automate flows created/modified, Power Apps published

Standard vs Premium Audit

Premium Audit provides longer retention and critical investigation events
FeatureStandard AuditPremium Audit
Retention180 days1 year (configurable up to 10 years)
EventsCommon user and admin activitiesAll Standard events + high-value events (MailItemsAccessed, Send, SearchQueryInitiatedExchange)
Key premium eventN/AMailItemsAccessed β€” shows exactly which emails were read by a compromised account
LicenceMicrosoft 365 E3/A3/G3Microsoft 365 E5/A5/G5 or E5 Compliance add-on
Investigation valueGood for general investigationsEssential for BEC and data breach investigations
πŸ’‘ Exam tip: MailItemsAccessed is Premium only

MailItemsAccessed is the most important Premium Audit event for SOC analysts. It records every time an email is accessed β€” by the user, by an app, or by an attacker.

If the exam describes a scenario where you need to determine β€œwhich emails a compromised account read,” the answer requires Premium Audit with the MailItemsAccessed event. Standard Audit does not capture this level of detail.

Investigation workflow with Audit

  1. Define your search β€” which user(s), which time period, which activities
  2. Search Audit logs β€” filter by activity type (e.g., FileDownloaded, MailItemsAccessed, InboxRuleCreated)
  3. Review results β€” who did what, when, from which IP address, using which app
  4. Export for analysis β€” download results as CSV for detailed review
  5. Correlate with other signals β€” match Audit findings with Defender XDR alerts
πŸ’‘ Scenario: James investigates a BEC attack using Audit

James at Pacific Meridian is investigating a business email compromise. The attacker used a compromised exec account for 3 days before detection.

Audit search results:

  • MailItemsAccessed β€” attacker read 340 emails, primarily from Finance and Legal folders
  • InboxRuleCreated β€” attacker created a rule forwarding emails containing β€œwire transfer” to an external address
  • FileDownloaded β€” attacker downloaded 15 files from the β€œExecutive Strategy” SharePoint site
  • MessageSent β€” attacker sent 3 emails impersonating the exec requesting wire transfers

James now knows exactly what the attacker accessed and can begin data breach notification assessment.

Full investigation workflow: joining all three tools

In real investigations, you often need all three tools together. Here is how they connect:

Scenario: James investigates a suspected data breach

Day 1 alert: Defender XDR flags a suspicious OAuth app accessing executive mailboxes.

Step 1: Purview Audit β€” what did the attacker do?

James searches Audit logs for the compromised executive:

  • MailItemsAccessed (Premium) β†’ 340 emails read, mostly Finance and Legal folders
  • InboxRuleCreated β†’ forwarding rule to external-drop@protonmail.com
  • FileDownloaded β†’ 15 files from β€œExecutive Strategy” SharePoint library
  • Consent granted β†’ OAuth app β€œOutlook-Sync-Pro” given Mail.ReadWrite + Files.Read.All

Step 2: Content Search β€” what data was exposed?

James uses Content Search to find the actual content:

  • Search: from:cfo@pacificmeridian.com AND (subject:"wire transfer" OR subject:"payment") β†’ 12 emails containing bank account numbers
  • Search: filename:"Executive Strategy" in SharePoint β†’ 15 files including M&A plans and board materials
  • These results go to Legal for data breach notification assessment

Step 3: Graph activity logs β€” what did the OAuth app do?

James filters Graph logs by the malicious app ID:

  • 1,200 GET /me/messages calls β†’ reading all emails programmatically
  • 45 GET /me/drive/root/children calls β†’ listing OneDrive structure
  • 12 GET /me/drive/items/{id}/content calls β†’ downloading specific files

The complete picture: A malicious OAuth app gained access via consent phishing, read 340 emails (some containing financial data), downloaded 15 strategic documents, and created a forwarding rule for ongoing exfiltration. The Audit tells James what happened, Content Search tells him what data was exposed, and Graph logs tell him how the app operated.

Content Search

Content Search finds specific content across M365 β€” emails, documents, Teams messages.

When to use Content Search

ScenarioHow Content Search Helps
Find a phishing emailSearch all mailboxes for emails from a specific sender or containing a specific URL
Locate sensitive documentsSearch SharePoint/OneDrive for files matching keywords or sensitivity labels
Recover deleted messagesSearch recoverable items (soft-deleted content) in Exchange
Compliance investigationFind all content matching specific criteria for legal hold or eDiscovery

Search syntax

Content Search uses Keyword Query Language (KQL) β€” but note this is NOT the same KQL as Kusto Query Language used in Sentinel and Advanced Hunting. They share the acronym but are completely different languages. Content Search KQL uses property-value syntax:

  • from:attacker@evil.com β€” emails from a specific sender
  • subject:"invoice payment" β€” emails with a specific subject
  • filename:payload.exe β€” files with a specific name
  • sent>=2026-04-01 AND sent<=2026-04-15 β€” emails within a date range

Microsoft Graph activity logs

Graph activity logs record all API requests made to Microsoft Graph β€” the API that connects Microsoft 365 services.

Why Graph logs matter for investigations

Most modern attacks use the Microsoft Graph API directly:

  • OAuth app abuse β€” malicious apps use Graph to read emails and files
  • Automation abuse β€” compromised Power Automate flows use Graph to exfiltrate data
  • Administrative attacks β€” attackers use Graph to modify user settings, group memberships, or Conditional Access policies

What Graph logs capture

FieldWhat It Shows
RequestIdUnique identifier for the API call
AppIdWhich application made the call
UserIdWhich user context (or service principal)
ResourceUriWhich Graph endpoint was called (e.g., /me/messages, /users/{id}/drive)
HttpMethodGET, POST, PATCH, DELETE
ResponseStatusCodeDid the call succeed (200) or fail (403, 404)?
IPAddressWhere the call came from
πŸ’‘ Scenario: Elena investigates a suspicious OAuth app using Graph logs

Elena at Atlas Bank follows up on the consent phishing attack from Module 16. The malicious β€œDocuSign-Verify” app was revoked, but Elena needs to know exactly what it accessed.

Graph activity log search:

  • AppId matches the malicious app
  • 1,200+ GET /me/messages calls β€” reading all emails from 3 finance users
  • 45 GET /me/drive/root/children calls β€” listing OneDrive file structure
  • 12 GET /me/drive/items/{id}/content calls β€” downloading specific files

Elena correlates the file IDs with OneDrive audit logs to identify exactly which files were exfiltrated. This information goes to the legal and compliance team for breach assessment.

Question

What is the most important Premium Audit event for investigating BEC attacks?

Click or press Enter to reveal answer

Answer

MailItemsAccessed β€” it records every time an email is accessed (read) by a user, app, or attacker. It shows exactly which emails a compromised account viewed. This event is only available with Premium Audit (E5 licence).

Click to flip back

Question

What are the three M365 investigation tools and when to use each?

Click or press Enter to reveal answer

Answer

1. Purview Audit β€” who did what, when (user/admin activity logs across M365). 2. Content Search β€” find specific emails, files, or messages matching criteria (KQL queries). 3. Microsoft Graph activity logs β€” what API calls were made (app-level operations, OAuth abuse, automation).

Click to flip back

Question

Why are Microsoft Graph activity logs important for investigating OAuth attacks?

Click or press Enter to reveal answer

Answer

Malicious OAuth apps use the Graph API to access user data. Graph logs show exactly which API calls the app made β€” what endpoints it hit (messages, files, calendar), how many calls it made, and from which IP. This reveals the scope of data access during consent phishing attacks.

Click to flip back

Knowledge Check

James needs to determine exactly which emails a compromised executive account read during a 3-day BEC attack. What does he need?

Knowledge Check

Elena discovers that a malicious OAuth app made 1,200 Graph API calls to '/me/messages' on behalf of 3 users. Which investigation tool revealed this?

Knowledge Check

James is investigating a BEC attack where the attacker used a compromised executive account for 3 days. He needs to determine exactly which emails were read, which files were downloaded from SharePoint, and which Graph API calls a suspicious OAuth app made. Which combination of tools gives him the COMPLETE picture?

🎬 Video coming soon

Next up: Domain 2 is complete! We shift to Domain 3: Perform Threat Hunting β€” proactive searching for threats that your detections missed. We start with KQL foundations.

← Previous

Endpoint: Evidence & Entity Investigation

Next β†’

KQL Foundations for Threat Hunters

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.