- Out-of-the-box correlation rules for Office 365 events, enabling USM Anywhere to automatically create to notify you about suspicious activity in your environment.
- Predefined dashboards that give an overview of Microsoft OneDrive, Microsoft SharePoint, and Microsoft Azure Active Directory (AD) activity and provide quick visibility into Office 365 events to streamline your investigation and incident response processes.
- Direct access to the Microsoft Office 365 Management Activity API, giving you comprehensive visibility, a richer data set, and greater control over your cloud security, with information about your user, administration, system, and policy actions and events from Office 365 and Azure AD activity logs.
If you’re a Microsoft Windows user and want to include Office 365 logs in your USM Anywhere environment but don’t yet use Azure, you’ll need to sign up for an Azure subscription. The subscription is required to connect to the APIs that access your Office 365 environment.It is not required that you deploy the USM Anywhere Azure Sensor to use the BlueApp for Office 365. You can use any deployed sensor for the BlueApp connection.
If the BlueApp fails and you receive a message informing you that it has not been loaded, please contact LevelBlue Technical Support to solve the problem.
- BlueApp for Office 365 Requirements
- Configuring the BlueApp for Office 365
- Office 365 Event Latency
- Office 365 UserLoggedIn Event Discrepancy
- BlueApp for Office 365 Actions
- Creating Office 365 Response Action Rules
- Tutorial: Create a Notification Rule for Office 365 Users Logged In from a Different Location than Assigned