Searching the audit log in O365

Searching the audit log in O365 In the Security & Compliance Center, click Search & investigation > Audit log search. Configure the following search criteria (Note: Leave this box blank to return entries for all files, folders, and URLs in your organization): Activities. Click…

Enabling auditing in your O365 tenant

Enabling auditing in your O365 Tenant Enabling auditing in your tenant is a one-time process. Follow these steps to turn it on: In the Security & Compliance Center, click Search & investigation > Audit log search in the left navigation pane. Click Start recording…

Modifying an existing safe attachments policy in O365

Modifying an existing safe attachments policy The following steps illustrate how you would use the Security & Compliance Center to modify an existing safe attachments policy named SA block policy to exempt a security analyst named Ellie. The policy is configured with the…

Creating safe attachment policies in O365

Creating safe attachment policies by using the Security & Compliance Center You can set up an ATP safe attachments policy using either the Security & Compliance Center or the Exchange admin center (EAC). Creating a new safe attachment policy: The…

Managed Availability Components – Exchange 2016​

Managed Availability Components Probes The first component is called a Probe. Probes are responsible for taking measurements on the server and collecting data. There are three primary categories of probes: recurrent probes, notifications, and checks. Recurrent probes are synthetic transactions performed…