In a hurry? Download the Checklist Here


Microsoft 365 Insider Threat Detection Checklist

by Hermathena Labs

The Ultimate Guide to Monitoring Critical Insider Risk Indicators


HOW TO USE THIS CHECKLIST

This checklist is designed to help security teams identify and monitor the most important insider threat indicators in Microsoft 365 environments. For each indicator:

  1. Check if you’re currently monitoring for this activity
  2. Note the Microsoft 365 tool that provides this visibility
  3. Verify that you have alerts or regular reviews in place
  4. Document your current threshold or trigger settings

EMAIL & COMMUNICATION INDICATORS

Unusual Email Forwarding Rules

Tool: Exchange Admin Center, Audit Logs
Review Frequency: □ Weekly □ Bi-weekly □ Monthly

Unusual Email Attachment Activity

Tool: Microsoft Purview DLP, Exchange Online Protection
Review Frequency: □ Daily □ Weekly □ Monthly

Communications with Competitors

Tool: Communication Compliance, DLP
Review Frequency: □ Weekly □ Bi-weekly □ Monthly

Communication Pattern Changes

Tool: Communication Compliance, UEBA
Review Frequency: □ Weekly □ Bi-weekly □ Monthly


FILE & DOCUMENT INDICATORS

Mass File Downloads

Tool: SharePoint Audit Logs, Microsoft Purview
Review Frequency: □ Daily □ Weekly □ Monthly

Unusual File Access Patterns

Tool: SharePoint Analytics, Microsoft Purview
Review Frequency: □ Daily □ Weekly □ Monthly

File Manipulation to Evade DLP

Tool: DLP, SharePoint Audit Logs
Review Frequency: □ Daily □ Weekly □ Monthly

Unusual File Sharing

Tool: SharePoint Admin Center, Microsoft Defender for Cloud Apps
Review Frequency: □ Daily □ Weekly □ Monthly


AUTHENTICATION & ACCESS INDICATORS

Unusual Login Times

Tool: Microsoft Entra ID, Microsoft Sentinel
Review Frequency: □ Daily □ Weekly □ Monthly

Geographic Anomalies

Tool: Microsoft Entra ID Identity Protection
Review Frequency: □ Daily □ Weekly □ Monthly

Authentication Failures

Tool: Microsoft Entra ID, Microsoft Sentinel
Review Frequency: □ Daily □ Weekly □ Monthly

Privilege Changes

Tool: Microsoft Entra ID, PIM
Review Frequency: □ Daily □ Weekly □ Monthly


CLOUD APPLICATION INDICATORS

Shadow IT Usage

Tool: Microsoft Defender for Cloud Apps
Review Frequency: □ Weekly □ Bi-weekly □ Monthly

Cross-Service Data Transfers

Tool: Microsoft Defender for Cloud Apps
Review Frequency: □ Weekly □ Bi-weekly □ Monthly

Automation & API Activity

Tool: Microsoft Defender for Cloud Apps, Microsoft Sentinel
Review Frequency: □ Daily □ Weekly □ Monthly

Security Control Modifications

Tool: Microsoft Purview Compliance Portal, Microsoft Defender for Cloud Apps
Review Frequency: □ Daily □ Weekly □ Monthly


CONTEXTUAL RISK INDICATORS

HR Event Correlation

Tool: Microsoft Purview Insider Risk Management
Review Frequency: □ Daily □ Weekly □ As Needed

Departure Activities

Tool: Microsoft Purview Insider Risk Management
Review Frequency: □ Daily during notice period

Organizational Event Correlation

Tool: Microsoft Purview Insider Risk Management, Microsoft Sentinel
Review Frequency: □ Daily during sensitive periods

Peer Group Comparison

Tool: UEBA, Microsoft Sentinel
Review Frequency: □ Weekly □ Bi-weekly □ Monthly


TOOL CONFIGURATION VERIFICATION

Microsoft Purview Insider Risk Management

Microsoft 365 Audit Log

Microsoft Defender for Cloud Apps

Microsoft Entra ID

Data Loss Prevention


RESPONSE READINESS ASSESSMENT

Documentation

Team Preparedness

Technical Capabilities


READY TO STRENGTHEN YOUR INSIDER THREAT PROGRAM?

This checklist provides a starting point for monitoring insider threats in Microsoft 365, but implementing a comprehensive program requires expertise and experience.

For assistance in setting up effective monitoring for these indicators, book a free consultation. We’ll help you assess your current capabilities and develop a roadmap for enhancing your insider threat detection.

Schedule your free consultation at hermathenalabs.com/booking


© Hermathena Labs | www.hermathenalabs.com