Skip to main content

Activity Reports

Activity reports help administrators monitor, track, and analyze various user activities across their audited environment. These reports provide detailed insights into user behavior, helping to identify any suspicious or unauthorized actions. For example, you can easily track all changes made by a specific user, view a list of deleted accounts, and much more.

You can choose to view predefined Activity reports or create customized reports tailored to your needs by applying specific filters. To view custom reports, see the Create Reports with Custom Filters topic.

Activity reports collect data from the following environments:

  • Active Directory
  • Microsoft Entra ID
  • Exchange Online
  • File Server
  • SharePoint Online
  • SQL Database

Review a Report

Follow the steps to review an Activity report.

Step 1 – Click Reports in the top bar to navigate to the Reports page. By default, the page opens to the Activity tab with New Investigation selected in the left pane.

Step 2 – Select an organization from the drop-down menu at the top of the left pane to access its reports. An organization is selected by default, but you can choose a different one if needed.

Step 3 – In the left pane, click a category to view its reports.

Step 4 – Click a report to open it. Reports without a filter are automatically generated when you open them. Click Search to generate reports with a predefined filter set.

Activity reports are available under the following categories.

Overview

Report NameDescription
Activity Outside of Business HoursLists user activities that occur outside of predefined business hours. It helps detect unusual or suspicious behavior, such as logins or changes made during non-working hours.
All Logon ActivityLists all user login attempts across the environment. It helps track login trends, such as repeated failed login attempts.
Changes by DateLists all changes to monitored objects by date.
Changes by UserLists all changes made by a specific user. It helps track specific user action, such as changes made to accounts, permission, settings, etc.
Exchange OnlineLists audit logs for the Exchange sandbox.
Failed LogonsLists all failed login attempts. It helps identify potential security issues, such as unauthorized users trying to access the network.

Active Directory

Report NameDescription
Accounts DeletedLists all user accounts that have been deleted. It also provides information about when and by whom the accounts were deleted, which can help identify any unauthorized or suspicious activity within the system.
Accounts EnabledLists all user accounts that have been disabled.
Accounts DisabledLists all user accounts that have been disabled. It also provides information about when and by whom the accounts were disabled.
Accounts Locked OutLists all user accounts that have been locked out. It also provides information about when and by whom the accounts were locked out.
Accounts Password TemperedLists the user accounts where the password has been altered. It helps to detect unauthorized password changes.
Administrative Group Membership ChangesLists changes to membership of the Domain Admins, Enterprise Admins, Schema Admins, Account Operators, and other administrative groups. Members of these groups are entitled to perform critical activities in your IT infrastructure. Subscribe to this report or review it on a regular basis to detect security issues and ensure that administrative group membership is granted or revoked in compliance with your organization's security policies.
All Active Directory ChangesLists changes to all Active Directory objects including changes to permissions, configuration, etc. This is the most comprehensive report on Active Directory changes. Use it when you need to review every single change to any Active Directory object.
All Logon ActivityLists all user login attempts across the Active Directory. It helps track the login trends, such as repeated failed login attempts.
Computers RemovedLists all computer accounts that have been deleted. It also provides information about when and by whom the accounts were deleted, which can help identify any unauthorized or suspicious activity within the system.
Failed LogonsLists the failed login attempts. It is useful for identifying the potential security issues, such as unauthorized users trying to access the system.
Members Added to Administrative GroupLists all users who have been added to administrative groups. It helps administrators monitor changes to privileged groups and ensures that only authorized users have elevated access.
Members Removed from Administrative GroupLists all users who have been removed from the administrative groups. It helps administrators monitor changes to privileged groups and ensures that only authorized users have elevated access.
Organizational Unit ManagementLists changes made to organization units including, changes to name, description, delegation settings, etc.
Security Group Membership ChangesLists changes made to security groups including, changes to group membership, permissions, descriptions, etc.
User Account Status ChangesLists changes made to the status of user accounts, such as enabling, disabling, locking, or unlocking accounts.

Microsoft Entra ID

Report NameDescription
All Entra ID ChangesLists all changes made to Microsoft Entra ID objects, including creation, modification, and deletion
Entra ID Admin Permissions GrantedLists the users who have been granted admin level permissions
Entra ID Role Management Permissions GrantedIdentifies when the RoleManagement.ReadWrite.Directory (Delegated or Application) permission under Microsoft Graph is granted to a service principal. This permission allows an application to read and manage the role-based access control (RBAC) settings for your company's directory.
Entra ID Sign-In ActivityLists all sign-in attempts across the Microsoft Entra ID
Mail.Read Permissions Granted to ApplicationLists applications that have been granted permissions to read emails in all mailboxes without a signed-in user
MFA Rejected by UserLists occurrences where a user has rejected an MFA prompt. This could be an indicator that a threat actor has compromised the credentials of a user account and is attempting to gain unauthorized access to the account.
User Added to a Microsoft Entra IDPrivileged GroupLists users added to privileged groups
User Assigned New Privileged RoleLists users who have been assigned new eligible or active privileged roles. This does not include Privileged Identity Management (PIM) role activations.
User Removed from a Privileged RoleLists users whose privileged roles have been changed

Exchange Online

Report NameDescription
All Exchange Online ChangesLists all changes made to Exchange Online objects, configurations, and permissions.
All Exchange Online Non-Owner Mailbox Access EventsLists all mailbox access performed by someone other than the mailbox owner. Use this report to protect your Exchange Online organization by identifying unauthorized activity.
Exchange Online Group ChangesLists changes made to Exchange Online groups. Use this report to monitor the structure of your Exchange Online groups for changes that could lead to data leaks.
Exchange Online Mail User ChangesLists changes made to the properties ofmailusers, including delivery restrictions. Use this report to detect suspicious activity in your Exchange Online organization.
Exchange Online Mailbox Permissions ChangesLists all changes made to mailbox permissions, such as granting or revoking access rights to specific users. Use this report to detect unapproved permission changes.
Exchange Online Mailbox Policy ChangesLists modifications made to mailbox policies. Use this report to monitor security in your Exchange Online organization and spot changes to business-critical policies.

File Server

Report NameDescription
All File Server ChangesLists all activities occurring on audited file servers, including changes, failed modifications, file reads, and failed read attempts.
Copied FilesLists files that were copied within the monitored file share. For each file, it provides details, including the name, original file location, who copied the file, and when it was copied. Use this report to protect critical information against misuse and ensure that files containing sensitive data are not copied without a proper authorization. The report can be generated only for Windows file servers.
Created FilesLists newly created files and folders. It can be used to analyze increased disk space usage.
Deleted FilesLists the deleted files and folders. It helps track the removal of critical data and prevent accidental or unauthorized deletions.
Moved FilesLists files and folders that were moved to a new location within the monitored scope. For each file or folder, the report displays the name and location of the original object, who moved the object, and when it was moved.

SharePoint Online

Report NameDescription
All SharePoint Online ActivityLists all activities across SharePoint Online sites and OneDrive for Business.
Anonymous Sharing Link CreatedLists all instances where anonymous sharing links are created
Content ManagementLists content-related activities, such as uploads, downloads, modifications, and deletions, that have occurred within the sites, lists, list items, and documents
Data AccessLists the users who have accessed or downloaded documents from your SharePoint Online sites, or who have synchronized files to OneDrive for Business.
External User ActivityLists all activities performed by external users, such as guest users, on SharePoint Online. By using this report, administrators can monitor external user interactions and ensure compliance with external collaboration policies.
High Risk Members AddedMonitors the addition of high-risk members to sensitive groups
High Risk Permissions AddedTracks the assignment of high-risk permissions, such as granting broad access to various user groups. This report helps oversee and mitigate potential security risks by ensuring that elevated permissions are granted with proper authorization.
New Sharing Link with External User AccessMonitors the creation of new sharing links that grant access to external users
Sharing and Security ChangesTracks changes to security group membership, policies, and sharing settings, such as promoting a user to site collection administrator or sharing data with external users.
Site Sharing Settings ChangedTracks changes to site sharing settings, specifically for allowing external users. This report helps you manage and audit when and how your SharePoint sites are made accessible to users outside your organization.
Activity Related to Sensitive DataTracks all activity related to documents marked as sensitive. It provides insights into how sensitive information is accessed and modified.
Mass Modifications and Deletions of Sensitive DocumentsProvides an overview of all modifications and deletions related to sensitive documents. To receive alerts for this report, make sure the Mass Modifications and Deletions of Sensitive Documents alert is enabled in the alert profile assigned to your organization.
Excessive External Activity with Sensitive DataHighlights interactions between external users and documents labeled as sensitive. To receive alerts for this report, make sure the Excessive External Activity with Sensitive Data alert is enabled in the alert profile assigned to your organization.
Mass Failed Sensitive Data Access AttemptsMonitors unsuccessful attempts to access sensitive data, helping to identify potential security threats. It provides insights into unauthorized access attempts, enabling proactive measures to prevent future breaches and protect sensitive resources. To receive alerts for this report, make sure the Mass Failed Sensitive Data Access Attempts alert is enabled in the alert profile assigned to your organization.

SQL Database

Report NameDescription
All SQL LogonsLists all login attempts on the SQL Server. Use this report to analyze user activity on production databases.
SQL Failed LogonsLists the failed login attempts on the SQL Server. Use this report to identify potential security threats and analyze login issues.

Filter a Report

You can filter the data displayed in a report. Select a filter, operator, and value from the Filter, Operator, and Value drop-down menus, then click Search.

You can select more than one filter.

For options displayed in the Operator drop-down menu, see the Filter Operators topic.

Subscribe to Activity Reports

You can subscribe to Activity reports to receive them automatically via email, or have them uploaded to a specified folder in SharePoint Online. See the Subscriptions topic for additional information.