![]() ![]() Renamed folder – User renames a folder on a site.Moved folder – User moves a folder to a different location on a site.This includes changing the folder metadata, such as changing tags and properties. Modified folder – User modifies a folder on a site.Delete the folder from second-stage Recycle bin – User deletes a folder from the second-stage recycle bin on a site.Delete the folder from Recycle bin – User deletes a folder from the recycle bin on a site.Delete a folder – User deletes a folder from a site.Create a folder – User creates a folder on a site.Copied folder – User copies a folder from one site to another location in SharePoint or OneDrive for Business.By looking at the Folder activity category you can see the subset of activities that can be viewed.Įxpanding on these core activities, the following list outlines what each activity actually captures: Each category also contains multiple types of activities that can be selected. Other activities may be available based on services that are enabled within your tenant such as Dynamics 365. The general sets of logged activities are grouped into the following categories: The Audit log captures activities from multiple sources. Learn how Office Protect can help you save time while keeping your Audits Logs in checkĪudit Logs in Office 365: Understanding users’ activity reports Categories and activities The Audit log search featured within the Security & Compliance Center is the go-to tool for reviewing usage by activity and component. Having the ability to monitor all traffic within Office 365 means that you can not only see what is happening at any point in time but also be alerted about specific activities. ![]() Well, in reality, the biggest threat to any company is from within, namely employees. You may wonder why this is important for you as an organization. This means that you can easily know what tasks your end users are performing within any part of the service. Microsoft continues to invest heavily within Office 365 services, not just from a feature and functionality perspective, but more from the internals, such as logging and security. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |