Myrmex
Myrmex
Blog/Use Cases

Office 365 Admin Audit: Tracking Critical Changes

Office 365 Admin Audit: Tracking Critical Changes
Office 365OFFICE 365
Myrmex

The Challenge

Inappropriate administrative actions—intentional or accidental—are a leading cause of security incidents. Knowing who did what and when is crucial. However, the Office 365 Unified Audit Log mixes thousands of irrelevant events (file reads, user logins) with critical events (password changes, permission alterations), making manual incident detection slow and complex.

The goal was to:

  • Audit the latest actions performed by administrators
  • Filter only high-impact events (permissions, groups, security)
  • Obtain a clear timeline for forensic investigation or compliance
  • Identify anomalous behavior patterns

The Prompt Sent to Myrmex

Using the integration with the Office 365 tenant, we sent:

Audit the last 10 administrative actions in the Office 365 Unified Audit Log.
Focus on high-impact changes such as modifications to transport rules,
mailbox permissions, or security policy updates.
Present a chronological list including the user identity,
the specific change made, and the timestamp.

Note: Myrmex acts as a digital investigator, filtering "noise" from logs to present only relevant evidence.


What Myrmex Did

Myrmex queried the Office 365 Unified Audit Log, applying specific filters for administrative event categories (such as UserManagement, GroupManagement, and RoleAdministration), ignoring end-user events.

Timeline of High-Impact Actions

Timestamp (UTC)Identity / ActorAction PerformedCategory
04:06:18System/AdminGroup Lifecycle Policies GetPolicy
18:37:43Larissa FaustinoChange password (self-service)User Management
18:33:57Vinicius Silva (Admin)Reset password (Target: Larissa)⚠️ User Management
05:18:31MS Teams ServicesAdd member (Joao → Myrmex)Group Management
05:13:17MS Approval MgmtAdd member (Joao → Everyone)Group Management
05:07:32Myrmex ServiceCreate Group (Legal Ainext)Group Management
05:07:32Myrmex ServiceAdd Owner (SP → Legal Ainext)Group Management

Analysis and Observations

1. High-Privilege Operations

The log highlighted a critical action at 18:33:57: administrator vinicius.silva manually reset larissa.faustino's password. Implication: While appearing to be a legitimate support action, in a breach context, this could indicate an attacker taking control of a user account. The clear record allows for quick validation ("Vinicius, did you assist Larissa at that time?").

2. Automated Group Governance

Several automated events (by Myrmex Service and MS Teams Services) show group creation and population. Implication: Validates that onboarding automations are working correctly, adding users to the right groups without human intervention.

3. Absence of Structural Changes

The analysis confirmed that no transport rules (Exchange) or global security policies were changed during the period, ensuring environment integrity.


Benefits of the Approach

🕵️ Total Traceability

Every action is recorded and associated with a real identity, eliminating "I didn't do that."

⚡ Relevance Filter

Myrmex ignored thousands of "email read" or "file access" events to deliver only the 10 actions that truly impact tenant configuration.


Result

With the Myrmex audit:

  • Transparency: Clear history of who changed what.
  • Security: Detection of manual password resets (potential risk).
  • Control: Confirmation that global security configurations remained intact.

Prompt Variations

The same pattern can be used for specific investigations:

To investigate a suspicious user:

Audit all administrative actions performed by user 'admin@company.com'
in the last 7 days. Focus on data deletion or permission changes.

For email audit:

List all changes to 'Mailbox Permissions' (FullAccess or SendAs)
made in the last 48 hours on any executive mailbox.
MYRMEX | Office 365 Admin Audit: Tracking Critical Changes