July 7, 2021
CHALLENGE
A global fortune 500 company wanted to monitor user access to their Office 365 tenant.
Zeevo professionals developed and implemented a solution that extracts Office 365 user sign-in audit logs and transforms them for business intelligence use.
APPROACH
- Designed and implemented a Windows service to extract the user sign-in audit records using the available office 365 APIs
- The solution utilizes the available MS Graph and O365 Management APIs to extract audit logs
- Integrated with a third-party geographic location service to show user access from location detail
- Implemented security alerts for suspicious user access scenarios
OUTCOME
- The client benefited from the automated extraction and warehousing of user sign-in audit log records
- Enabled the client’s IT team to review user sign-in history details, including the client application used to connect, geographic location details, and any conditional access policies applied
- Developed and implemented new business intelligence reports and dashboards for monitoring user sign-in details and suspicious access attempts
ZEEVO’S VALUE ADD
- In-depth knowledge of available Office 365 APIs
- Expertise in designing, developing, testing, and implementing data extraction and transformation solutions, as well as business intelligence reports and dashboards
DOWNLOAD CLIENT CASE STUDY (.pdf)
Related reads:
- Creating Meaningful and Well-documented Desktop Procedures for Critical Business Processes
- Defining Business Requirements and Facilitating the Selection of a Records Management System
- Delivering Controls & Process Enhancements for World-Class Finance Operations
LET’S TALK
John McCartney
Phone: +1 760 933 8607
jmccartney@zeevogroup.com