M365 Alerting & Monitoring

Azure, Exchange, SharePoint & OneDrive

24/7/365 Monitoring & Rapid Alerts

When you’re a busy MSP managing multiple tenants, you need to know rapidly if anything unusual is going on. The last thing you need is an angry client asking why you didn’t spot cybercriminals were in their M365 accounts. The Microsoft warnings assume that cybercriminals haven’t breached your MSP. How would you know that one of your engineers hasn’t inadvertently given away their username and password? Remember, MFA is still really easy to get around.

BUT, without M365 automation how can you possibly achieve this?

You’d need a whole team of engineers constantly checking everywhere that cybercriminals could hide out or gain entry. Not an easy task, very time consuming, expensive and extremely boring. Also, how would you have time to do anything else?
These are the exact problems we encountered when we ran our MSP. So, we created these Tools to take away our biggest fear: one morning we would wake up to discover all our 150+ tenants had been breached.

Here's just a few of our Monitoring & Alerting Tools:

More tools added every month based on our worldwide MSP members' votes.

Monitoring & Alerting Tools
What It Does
Why
Azure/Entra ID  Monitoring & Alerting Tools

Location 

Monitors and alerts for any suspicious logins outside of your accepted locations. 

Use the tool to add new accepted locations by IP address, city, region or country and can be scheduled by time if required. 

Can also choose to instantly block suspicious account activity.

Most cyber attacks happen from suspicious locations. Monitor exactly what you need, confident that accounts are instantly blocked, if that's what you choose.

Admins

Monitors and alerts for new admins and changes to admin roles.

Admin access is the golden ticket for cybercriminals. Never miss when new ones are created/changed.

MFA Authentication Methods

Monitors and alerts for any new MFA authentication methods. Will be applied to all new accounts in tenant once activated, unless you choose to monitor individually.

Evil proxy attacks make use of authentication methods by registering a bogus method. Unless you are monitoring for this, you'll never know.

Azure App Monitor

Detect Azure applications and stop alerts for any that are legit

Azure apps are a key way cybercriminals can gain access to systems. Lets you keep on top of this risk

Forced Logout On Schedule

Forces individual user/s or the entire tenant to logout from all devices connected to O365 on a predefined schedule. Revokes the access token to force the user to resupply credentials and MFA. 

Number of days before each forced logout can be selected and the first day of the forced logout chosen. 

Could be implemented at business downtimes/ major holiday shutdowns. Removes cyber threat

Working Hours

Control the schedule for working hours. Enable and disable accounts across week and also within global setting

Security of accounts is massively improved if it can be disabled during inactive periods

License Monitoring Exclusions

By default system monitors and notifies for all tenants in your partner portal. Also, give option to exclude any tenants you don’t want to monitor.

Allows you to keep on top of license changes and spot if any have been added that shouldn’t have been .

Groups

Monitors and alerts on groups when an external user is added.

Cybercriminals will secretly add themselves to a group, so you need to stay in the know.

Exchange / Mailbox Monitoring & Alerting Tools

Forwarders

Allows you to approve/remove external forwarders that were detected by the live system. Can automatically block.

Quickly spot any forwarders placed on accounts and rapidly approve or remove them, leaving nothing to chance.

Mailbox Monitor

Choose the mailboxes you want to monitor for delegated permissions. Also approve/remove detected delegates.

Know rapidly if any permissions are added to key mailboxes and rectify just as quickly.

Mailbox Size Alerts

Alerts when a mailbox is reaching size capacity before functionality is lost. You can choose the alert threshold. Clearly defines mailbox folders and sizes.

Avoid customer down-time and stress. Pro-actively perform house keeping on mailboxes before they reach their limits.

Transport Rules

Spot any rules that may be set to re-direct mail.

Rapidly detect and fix what could be a cyber threat.

Inbox Rules

Alerts on all inbox rules that are detected in any scanned mailbox. You can choose which mailboxes you want scanning.

Again, rapidly detect and fix what could be a cyber threat.

External Sender Warning Exceptions

Allows warnings to be splashed on emails that are from external senders. Also allows you to select accounts you do not want this applied to

Be clear on any emails that are from external users.

Internal Spoofing Protection

Detects spoofed emails and flags a warning banner.

Make sure that you know if messages are spoofed – at a glance. Keeps your business safer.

Add Exception For Inbox Rules

If you have enabled inbox rule blocker, use when you need legitimate rules to function.

Make sure risky inbox rules aren’t posing a threat. Only let the ones through that you know are 100% legit.

Sharepoint / OneDrive Monitoring & Alerting

Sharing Alerts

Get alerted to any external sharing operations.

You need to know when external sharing of files is happening to keep your reputation and customers safe.

Mass Deletion Alert

Be aware if any mass deletions/changes or moves are made in SharePoint data. Customisable to data size alert levels.

Make sure you know rapidly if any SharePoint data is moved, renamed (which could be done with Ransomware attacks) and deleted in large quantities.