SHAREPOINT ONLINE CONFIGURATION GUIDE 2021 - STEALTHBITS

Page created by Roland Watts
 
CONTINUE READING
2021

SharePoint Online Configuration Guide
StealthAUDIT®
Stealthbits Activity Monitor®

                                                   TOC
    SharePoint Online Configuration Overview                                         3

         SharePoint Compatibility                                                    3

    StealthAUDIT SharePoint Scan Options                                             4

         SharePoint Agent-Less Scans                                                 4

             Firewall Rules for Agent-Less Scans                                     5
             SharePoint Data Collection Configuration for Agent-Less Scans           6

    Activity Monitor Configuration                                                   7

         Activity Monitor Activity Agent Deployment                                  7

         Prepare for Activity Monitoring                                             7

         Monitored Host Configuration                                                8

         Firewall Rules for Activity Monitoring                                     10

         SIEM Integration                                                           10

    SharePoint Online Configuration for Access Auditing                             12

         Configure Modern Authentication for SharePoint Online & OneDrive           12

             Register StealthAUDIT with SharePoint as an Application                13
             Provision the StealthAUDIT SharePoint Registered Application           13

    SharePoint Online Configuration for Activity Monitoring                         15

         Register Activity Monitor with Microsoft Azure as a Web Application        15

             Register Activity Monitor with Microsoft Azure                         16
             Identify the Client ID & Client Key                                    16
             Grant Permissions for Activity Monitoring in Microsoft Azure           17

    StealthAUDIT Connection Profile & Host List                                     19

         SharePoint Online Custom Connection Profile                                19

         SharePoint Custom Host List                                                20

    More Information                                                                21

Doc_ID 736                                                                               2

             Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
StealthAUDIT®
Stealthbits Activity Monitor®

         SharePoint Online Configuration Overview
 Stealthbits products audit and monitor Microsoft® SharePoint® environments. StealthAUDIT
 employs the SharePoint solution to execute Access Auditing (SPAA) and/or Sensitive Data
 Discovery Auditing scans against SharePoint Online. The Activity Monitor can also monitor
 SharePoint Online activity; however, this event data is not supported by StealthAUDIT 11.0.
 Additionally, the Activity Monitor can be configured to provide activity data to various SIEM
 products.

 This document describes the necessary settings in SharePoint to allow for successful use of:

 l   StealthAUDIT v11.0
 l   Stealthbits Activity Monitor v6.0

 The Sensitive Data Discovery Add-on must be installed on the StealthAUDIT Console server. Each
 thread requires a minimum of 2 additional GB of RAM per host. For example, if the job is
 configured to scan 8 hosts at a time, then an extra 16 GB of RAM are required (8x2=16).

 The sections of this document align to the products as follows:

 l   StealthAUDIT
     l   StealthAUDIT Scan Options
     l   Activity Monitoring for SharePoint
     l   SharePoint Online Configuration for Access Auditing
     l   StealthAUDIT Connection Profile & Host List
 l   Stealthbits Activity Monitor
     l   Activity Monitoring for SharePoint
     l   SharePoint Online Configuration for Activity Auditing

 SharePoint Compatibility
 StealthAUDIT for SharePoint is compatible with the following Microsoft® SharePoint®
 environments as targets:

 l   SharePoint Online®
 l   OneDrive® for Business (Access Auditing and/or Sensitive Data Discovery Auditing Agent-less
     only type scans)

Doc_ID 736                                                                                         3

             Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
StealthAUDIT®
Stealthbits Activity Monitor®

             StealthAUDIT SharePoint Scan Options
 Required permissions on the targeted SharePoint environment are dependent upon not only the
 type of environment targeted but also the type of data collection scan being executed. There are
 two types of Access Auditing (SPAA) and/or Sensitive Data Discovery Auditing scans: agent-based
 and agent-less. The Activity Auditing (SPAC) scans can only be executed as agent-less scans from
 StealthAUDIT but require the Activity Monitor to have a activity agent deployed in the target
 environment.

 Agent-Based Type

 When StealthAUDIT SharePoint scans are run in agent-based mode, the StealthAUDIT SharePoint
 Agent must be installed on the SharePoint Application server which hosts the “Central
 Administration” component prior to executing the scans. This is typically the first server stood up
 during the SharePoint farm installation process in this mode. The data collection processing is
 conducted by the SharePoint Agent for the target environment. The final step in data collection is
 to transfer the data collected in the SQLite databases, or Tier 2 databases, on the StealthAUDIT
 SharePoint Agent server back to the StealthAUDIT Console server.

 NOTE: Agent-based scans can only target on-premise environments.

 Agent-Less Type

 When SharePoint agent-less scans are run, it means all of the data collection processing is
 conducted by the StealthAUDIT Console server across the network. Agent-less scans can target
 both on-premise and online environments.

 SharePoint Agent-Less Scans
 The SharePoint agent-less scan architecture is capable of auditing permissions and content, or
 Access Auditing (SPAA) and Sensitive Data Discovery Auditing, on SharePoint on-premise and
 SharePoint Online. It is also capable of Activity Auditing (SPAC) on SharePoint on-premise.

 The SharePoint agent-less scan architecture requires permissions to be configured on the
 specified server:

 l   SharePoint Online & OneDrive for Business
     l   Modern Authentication Option:
         l   Register StealthAUDIT as a SharePoint application to the targeted SharePoint Online
             environment – Requires SharePoint Global Administrator role to register and provision

Doc_ID 736                                                                                           4

              Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
StealthAUDIT®
Stealthbits Activity Monitor®

             the application
             NOTE: The SharePoint application registration will need to be refreshed annually.
    l   Legacy Authentication Option:
         l   SharePoint Administrator Role
         l   Site Administrator of the root site to be audited
         l   OneDrive permissions are based on the SharePointAccess Data Collection configuration
             option:
             l   Forcing the service account to become a temporary admin of the personal sites either
                 as the service account or as a member of the Company Administrators group requires
                 SharePoint Global Administrator role.
             l   The skipping inaccessible personal sites option will only scan sites where the service
                 account has administrative access.
         l   The service account must be a licensed SharePoint account in order to scan OneDrive
             and/or personal sites.

 Sensitive Data Discovery Auditing scans also require the Sensitive Data Discovery Add-on be
 installed on the StealthAUDIT Console server. Each thread requires a minimum of 2 additional GB
 of RAM per host. For example, if the job is configured to scan 8 hosts at a time, then an extra 16
 GB of RAM are required (8x2=16). See the StealthAUDIT Sensitive Data Discovery Add-On
 Installation Guide for additional information.

 The credentials within the Connection Profile assigned to the SharePoint scans must have the
 required rights and firewall rules configured for running Access Auditing (SPAA) and/or Sensitive
 Data Discovery Auditing scans.

 Firewall Rules for Agent-Less Scans
 One of the following ports must be open for communication between StealthAUDIT and the
 SharePoint Online environment:

    Port           Protocol          Source          Direction         Target             Purpose

   80              TCP           StealthAUDIT                      SharePoint         HTTP
                                 Console server                    Online             Communication
                                                                   Environment

   443             TCP           StealthAUDIT                      SharePoint         HTTPS

Doc_ID 736                                                                                                5

                 Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
StealthAUDIT®
Stealthbits Activity Monitor®

     Port        Protocol         Source          Direction         Target             Purpose

                              Console server                    Online            Communication
                                                                Environment

 SharePoint Data Collection Configuration for Agent-Less Scans
 To employ the agent-less type of scan for collecting SharePoint data, navigate to the desired
 SharePoint > 0.Collection > …_SystemScans job(s) and open the SharePoint Access Auditor Data
 Collector Wizard from the job’s query. The following configuration settings are required to
 employ agent-less scans:

 l   Agent Settings wizard page – Enable Agent Service Scans option must remain unselected

 Other configuration settings which directly relate to permission options:

 l   SharePoint data collection settings page
     l   Collect Personal Sites > Skip inaccessible personal sites option requires the service account
         to be provisioned prior to the scan to scan OneDrives / personal sites
     l   Collect Personal Sites > Force scan account as admin of inaccessible personal sites option
         requires the service account to be a SharePoint Global Administrator (online) or Farm
         Admin (on-premise)
     l   Collect Personal Sites > Force Company Administrator as admin of inaccessible personal
         sites option requires the service account to be a SharePoint Global Administrator (online) or
         Farm Admin (on-premise)

 See the SPAA Query Configuration section of the StealthAUDIT User Guides v11.0 for additional
 information.

 NOTE: Sensitive Data Discovery Auditing scans are configured on the DLP Audit Settings and
 Select DLP Criteria wizard pages of the SharePoint Access Auditor Data Collector Wizard from the
 1-SPSEEK_SystemScans Job.

Doc_ID 736                                                                                            6

             Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
StealthAUDIT®
Stealthbits Activity Monitor®

                     Activity Monitor Configuration
 The Activity Monitor collects activity events from SharePoint Online. There must be a deployed
 activity agent on a Windows server to monitor the target environment.

 While actively monitoring, the agent generates activity log files which are stored on the agent
 server. The Activity Monitor integrates with SIEM products:

 l   Stealthbits Activity Monitoronly
     l   Activity Monitor agent writes activity log files on the agent server.
     l   Activity Monitor Console search feature displays data from the activity log files.
 l   SIEM Integration
     l   Activity Monitor activity agent writes activity log files on the activity agent server.
     l   Activity Monitor sends the event stream to the SIEM product, which is configured on the
         Monitored Hosts’ properties > Syslog tab.

 Activity Monitor Activity Agent Deployment
 Servers targeted for activity agent deployment must have .NET Framework 4.7.2 or higher
 installed or the deployment fails. Deploy an activity agent from the Activity Monitor Console. The
 credential supplied during deployment must have:

 l   Group membership in the local Administrators group

 Follow the steps to deploy an activity agent.

 Step 1 – On the Agents tab, click Add agent to open the Add New Agent(s) window.

 Step 2 – On the Install new agent page, enter the Server name to deploy to a single server.

 Step 3 – On the Credentials to connect to the server(s) page, provide the provisioned credential.

 Remember, Remote Registry Service must be enabled on the host where the activity agent is
 deployed.

 See the Stealthbits Activity Monitor Installation & Console User Guide for additional information
 on deploying and configuring the activity agent.

 Prepare for Activity Monitoring

Doc_ID 736                                                                                            7

             Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
StealthAUDIT®
Stealthbits Activity Monitor®

 The target environment must be prepared for activity monitoring before the activity agent is
 configured. This preparation includes:

 l   For SharePoint Online, configure access to the infrastructure
 l   Configure Firewall

 Once this preparation is complete, the activity agent can be configured for monitoring through
 the Activity Monitor Console. See the SharePoint Online Configuration for Activity Monitoring
 section for details on completing this preparation.

 Monitored Host Configuration
 After activity agent deployment and the preparations for monitoring have been completed, add
 the Monitored Host to the activity agent server. In the Activity Monitor Console, open the Add
 New Host window and provide the following information:

 l   On the Choose Agent page, select the server for the Agent.
 l   On the Add Host page:
     l   Select the appropriate Storage device type.
     l   Then enter the Azure Active Directory domain name in the textbox.
     l   Optionally add a Comment to indicate intended output.
 l   On the Azure AD Connection page, enter the enter the Client ID and Client Secret, then click
     Sign In
     NOTE: The Activity Monitor must be registered with Microsoft® Azure® in order to sign in.
 l   On the SharePoint Online Operations page, configure the options found in the following tabs:
     File and Page, Folder, List, Sharing and Access Request, Site Permissions, Site Administration,
     Synchronization, DLP, Sensitive Label, Content Explorer, and Other.
 l   On the Configure Basic Options page, the following configurations are modified:
     l   Period to keep Log files - Activity logs are deleted after the number of days entered. Default
         is set to 10 days.
         RECOMMENDED: Keep a minimum of 10 days of activity logs. Raw activity logs should be
         retained to meet an organization’s audit requirements.
 l   On the Where to Log the Activity page, select whether to send the activity to either a Log File
     or Syslog Server.

Doc_ID 736                                                                                             8

             Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
StealthAUDIT®
Stealthbits Activity Monitor®

 l   Configure the options on either the Log File page, the Syslog Server page, or both, depending
     on what options were selected on the Where to Log the Activity page.
     l   For Log File, the configurable options are:
         l   Specify output file path – Specify the file path where log files are saved. Click the ellipses
             button (...) to open the Windows Explorer to navigate to a folder destination. Click Test
             to test if the path works.
         l   Period to keep Log files – Log files will be deleted after the period entered number of
             days entered. The default is 10 days. Use the dropdown to specify whether to keep the
             Log files for a set amount of Minutes, Hours, or Days.
         l   This log file is for StealthAUDIT – Enable this option to have StealthAUDIT collect this
             monitored host configuration
             RECOMMENDED: Identify the configuration to be read by StealthAUDIT when integration
             is available.
             l   While the Activity Monitor can have multiple configurations per host, StealthAUDIT
                 can only read one of them.
     l   For Syslog, the configurable options are:
         l   Syslog server in SERVER[:PORT] format – Type the Syslog server name with a
             SERVER:Port format in the textbox.
             l   The server name can be short name, fully qualified name (FQDN), or IP Address, as
                 long as the organization’s environment can resolve the name format used. The Event
                 stream is the activity being monitored according to this configuration for the
                 monitored host.
         l   Syslog Protocol – Identify the Syslog protocol to be used for the Event stream. The drop-
             down menu includes:
             l   UDP
             l   TCP
             l   TLS
             l   The TCP and TLS protocols add the Message framing drop-down menu. See the Syslog
                 Tab section for additional information.
         l   The Test button sends a test message to the Syslog server to check the connection. A
             green check mark or red will determine whether the test message has been sent or failed
             to send. Messages vary by Syslog protocol:

Doc_ID 736                                                                                                    9

                 Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
StealthAUDIT®
Stealthbits Activity Monitor®

             l   UDP – Sends a test message and does not verify connection
             l   TCP/TLS – Sends test message and verifies connection
             l   TLS – Shows error if TLS handshake fails
             l   See the Syslog Tab section for additional information.

 After the monitored host configuration is complete, additional steps are required for and SIEM
 integration. See the SIEM Integration section for additional information.

 Firewall Rules for Activity Monitoring
 Firewall settings are dependent upon the type of environment being targeted. The following
 firewall settings are required for communication between activity agent server and the Activity
 Monitor Console:

         Communication Direction                 Protocol        Ports          Description

   Activity Monitor to Activity Agent           TCP             4498      Activity Agent
   Server                                                                 Communication

 The Windows firewall rules need to be configured on the Windows server, which require certain
 inbound rules be created if the scans are running in applet mode. These scans operate over a
 default port range, which cannot be specified via an inbound rule. For more information, see the
 Microsoft Connecting to WMI on a Remote Computer article.

 SIEM Integration
 The Activity Monitor can be configured to stream events to various SIEM products.

 NOTE: The Activity Monitor can be configured for multiple outputs for a host, e.g. for or SIEM
 products. Add a new output for the same host to the Monitored Host tab in the Activity Monitor
 Console to customize the activity data to be sent to a SIEM product.

 RECOMMENDED: Add a Comment to identify the product for which the output aligns. Comments
 can be added when the new output is configured on the Add Hosts page or when the host
 properties are edited on the Comments tab.

 After the Activity Monitor has been configured to monitor a host, it is necessary to select a syslog
 template to be used for communicating with the SIEM product. The following Syslog templates
 have been provided:

Doc_ID 736                                                                                         10

                 Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
StealthAUDIT®
Stealthbits Activity Monitor®

 l   LEEF (generic LEEF message format)

 Follow these steps to configure the Activity Monitor to stream event data to a SIEM product.

 Step 1 – Within the Activity Monitor Console on the Monitored Hosts tab, select the desired
 configuration and click Edit. Select the Syslog tab.

 Step 2 – Type the server name for the SIEM product in a [SERVER]:[PORT] format in the textbox.

 Step 3 – Select the desired Syslog protocol from the drop-down menu.

 Step 4 – Click the ellipsis (…) to open the Syslog Message Template window.

 Step 5 – Select the desired template from the Template drop-down menu. If desired, the
 message can be modified, which creates a “Custom” template.

 Step 6 – Click OK to save the selection and close the Syslog Message Template window.
 Remember, it is recommended to select the Comments tab and identify this output as being
 configured for the SIEM product, e.g. SIEM.

 Step 7 – Then click OK to save the changes and close the host’s properties window.

 The template is assigned as the Syslog message template for the selected monitored host. The
 SIEM product begins receiving event stream data.

Doc_ID 736                                                                                        11

             Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
StealthAUDIT®
Stealthbits Activity Monitor®

     SharePoint Online Configuration for Access
                      Auditing
 In order for StealthAUDIT to execute Access Auditing (SPAA) and/or Sensitive Data Discovery
 Auditing scans, the credential must have the following permissions for the target SharePoint
 Online & OneDrive for Business environment:

 l   Modern Authentication Option:
     l   Register StealthAUDIT as a SharePoint application to the targeted SharePoint Online
         environment — Requires SharePoint Global Administrator role to register and provision the
         application
 l   Legacy Authentication Option:
     l   SharePoint Administrator Role
     l   Site Administrator of the root site to be audited
     l   OneDrives permissions are based on the SharePointAccess Data Collector configuration
         option:
         l   Forcing the service account to become a temporary admin of the personal sites either as
             the service account or as a member of the Company Administrators group requires
             SharePoint Global Administrator role.
         l   The skipping inaccessible personal sites option will only scan sites where the service
             account has administrative access. See the SharePoint Online Configuration for Access
             Auditing section for additional information.
     l   Service account must be a licensed SharePoint account in order to scan OneDrive and/or
         personal sites

 NOTE: The SharePoint application registration will need to be refreshed annually.

 Configure Modern Authentication for SharePoint Online &
 OneDrive
 Configure Modern Authentication for SharePoint Online and OneDrive by first registering
 StealthAUDIT as a SharePoint, and then provision the registered application. This requires
 SharePoint Global Administrator role.

 NOTE: The SharePoint application registration will need to be refreshed annually.

Doc_ID 736                                                                                            12

              Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
StealthAUDIT®
Stealthbits Activity Monitor®

 Register StealthAUDIT with SharePoint as an Application
 Follow the steps to register StealthAUDIT as a SharePoint application.

 Step 1 – Navigate to the SharePoint Application Registration page:
             https://[tenant].sharepoint.com/_layouts/15/appregnew.aspx

 Step 2 – Click Generate to create the Client Id and Client Secret.

 Step 3 – In the Title field, name the app StealthAUDITApp.

 Step 4 – In the App Domain field, enter www.localhost.com.

 Step 5 – In the Redirect URL field, enter https://www.localhost.com.

 Step 6 – Click Create.

 CAUTION: Do not leave the following page without copying the Client Id and Client Secret.

 Step 7 – Copy the Client Id and Client Secret to be used to provision the app and used in the
 StealthAUDIT Connection Profile. Click OK.

 StealthAUDIT is a registered SharePoint application.

 Provision the StealthAUDIT SharePoint Registered Application
 Follow the steps to provision the registered application for StealthAUDIT.

 Step 1 – Navigate to the SharePoint Application Invitation Site:
             https://[tenant]-admin.sharepoint.com/_
                  layouts/15/appinv.aspx

 Step 2 – Paste the Client Id into the App Id field. Click Lookup. The app information is populated.

 Step 3 – In the Permission Request XML, paste the following:
             
Doc_ID 736                                                                                        13

             Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
StealthAUDIT®
Stealthbits Activity Monitor®

 Step 4 – Click Create.

 Step 5 – Click Trust It.

 The registered StealthAUDIT SharePoint application has been provisioned to scan SharePoint
 Online and OneDrive.

Doc_ID 736                                                                                    14

             Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
StealthAUDIT®
Stealthbits Activity Monitor®

     SharePoint Online Configuration for Activity
                     Monitoring
 In order to collect logs and monitor SharePoint Online activity using the Activity Monitor, it needs
 to be registered with Microsoft® Azure®. This guide explains how to enable auditing on a
 SharePoint Online environment and to configure the Activity Monitor to monitor activity coming
 from SharePoint Online.

 The Azure requirements for activity monitoring of SharePoint Online are:

 l   Global Administrator role in SharePoint Online
 l   Client ID
 l   Client Secret
 l   Microsoft Graph API/Permissions:
     l   Application:
         l   AuditLog.Read.All
         l   Directory.Read.All
         l   User.Read.All
         l   Sites.Read.All
     l   Delegated:
         l   offline_access
         l   openid
         l   profile
         l   User.Read
         l   User.Read.All
 l   Office 365 Management APIs
     l   Application Permissions:
         l   ActivityFeed.Read
         l   ActivityFeed.ReadDlp

 Register Activity Monitor with Microsoft Azure as a Web
 Application
Doc_ID 736                                                                                         15

              Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
StealthAUDIT®
Stealthbits Activity Monitor®

 The Activity Monitor must be registered as a web application in Microsoft Azure before initiating
 activity monitoring. Registering the Activity Monitor will produce a Client ID and Client Secret,
 which are required for configuring the Activity Monitor to target SharePoint Online. See
 Microsoft Support for assistance in configuring the Microsoft® Azure™ SharePoint Online web
 application.

 Register Activity Monitor with Microsoft Azure
 Follow the steps to register the Activity Monitor with Microsoft Azure.

 Step 1 – Sign into Azure. Navigate to the Azure portal and click on App registrations.

 Step 2 – On the App registrations page, click New registration.

 Step 3 – On the Register an application page, configure the following options:

 l   Name – Enter a user-facing display name for the Activity Monitor application
 l   Supported account types – Select who can use the application or access the API:
     l   Accounts in this organizational directory only – All internal organization accounts
     l   Accounts in any organizational directory – All Microsoft business or school accounts
     l   Accounts in any organizational directory and personal Microsoft accounts – All users with
         work, school, or personal accounts
         RECOMMENDED: Use the Accounts in this organizational directory only option
 l   Redirect URI – Set the Redirect URI to Public client/native (mobile & desktop) from the drop
     down menu. In the text box, enter the following:

             urn:ietf:wg:oauth:2.0:oob

 Step 4 – Click Register. The Overview page for the newly registered Activity Monitor will open.

 Step 5 – Review the newly created registered application.

 Step 6 – Now that the application has been registered, permissions need to be granted to it.

 Identify the Client ID & Client Key
 Follow the steps to find the registered application’s Client ID and generate the Client Secret.

 Step 1 – In the Azure portal, on the left-hand navigation pane, click Azure Active Directory.

 Step 2 – In the Azure Active Directory blade, click App Registrations.

Doc_ID 736                                                                                           16

             Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
StealthAUDIT®
Stealthbits Activity Monitor®

 Step 3 – Copy the Client ID from the Overview page for the registered application.

 NOTE: The Client ID is needed for adding an Azure Active Directory host in the Activity Monitor.
 See the Monitored Host Configuration section for additional information.

 Step 4 – Select Certificates & secrets in the left-hand navigation pane.

 CAUTION: The newly generated Client Secret will not be accessible after leaving the Client &
    Secrets page. It is recommended to copy the Client Secret to a location that can be accessed
    later when configuring the Azure Active Directory host in the Activity Monitor.

 Step 5 – On the Client & secrets page, click the New client secret button located in the Client
 secrets section, and the Add a client secret popup opens.

 Step 6 – Provide a description for the Client Secret, and select an expiration date.

 NOTE: It is best practice to configure the Client Secret to expire in 1 or 2 years.

 Step 7 – A Client Secret is generated for the Activity Monitor Client ID. Copy the Client Secret.

 The Client ID and Client Secret are now ready to be used to add and configure a SharePoint
 Online Activity Monitor host.

 Grant Permissions for Activity Monitoring in Microsoft Azure
 Follow the steps to set up permissions to enable the Activity Monitor to monitor data and collect
 logs for SharePoint Online.

 Step 1 – Navigate to the Activity Monitor application portal in Microsoft Azure and select API
 Permissions from the left-hand navigation menu.

 Step 2 – On the API permissions page, click on Add a permission to open the Request API
 Permissions window.

 Step 3 – Click Microsoft Graph. Select the following Delegated and Application Permissions:

 l   Application Permissions:
     l   AuditLog.Read.All
     l   Directory.Read.All
     l   User.Read.All
 l   Delegated Permissions:
     l   User.Read – added by default
     l   offline_access

Doc_ID 736                                                                                           17

             Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
StealthAUDIT®
Stealthbits Activity Monitor®

    l   openid
    l   profile
    Click Add permissions.

 Step 4 – On the API Permissions, click the Grant admin consent for [Tenant Name] button
 located above the permissions list, next to the Add a permission button, then click Yes in the
 confirmation window.

 The Activity Monitor now has the necessary permissions configured and granted to monitor
 Azure Active Directory activity and collect logs.

Doc_ID 736                                                                                        18

             Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
StealthAUDIT®
Stealthbits Activity Monitor®

     StealthAUDIT Connection Profile & Host List
 Once the target environment has been configured for auditing, it is necessary to create a custom
 Connection Profile and a custom Host List within StealthAUDIT.

 SharePoint Online Custom Connection Profile
 Within in StealthAUDIT, create a Connection Profile for the target hosts with the credentials
 configured. It should align to the target host list to be created next. For Access Auditing (SPAA)
 and/or Sensitive Data Discovery Auditing scans, the Connection Profile needs to contain the
 account provisioned for Access Auditing (SPAA). Remember, StealthAUDIT v11.0 does not support
 activity event data from the Activity Monitor for SharePoint Online.

 For a SharePoint Online account, set the following information on the User Credentials window:

 l   Modern Authentication option:
     l   Select Account Type – Azure Active Directory
     l   Domain – {not a field for this type of credential, defaults to }
     l   Client ID – Paste Client Id from StealthAUDIT SharePoint App Registration
     l   Password Storage – Application (uses StealthAUDIT’s configured Profile Security setting as
         selected at the Settings > Application node)
     l   Key – Paste Client Secret from StealthAUDIT SharePoint App Registration
 l   Legacy Authentication option:
     l   Select Account Type – StealthAUDIT Task (Local) Account
     l   Domain – {not a field for this type of credential, defaults to }
     l   User name – Type the user name
         l   Input [UserName@Domain] when entering credentials for Connection Profile
     l   Password Storage – Application (uses StealthAUDIT’s configured Profile Security setting as
         selected at the Settings > Application node)
     l   Password – [For the provided user account]
     l   Confirm – Re-type the password

 See the Connection section of the StealthAUDIT User Guides v11.0 for instructions on creating a
 Connection Profile.

Doc_ID 736                                                                                            19

              Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
StealthAUDIT®
Stealthbits Activity Monitor®

 Apply the Connection Profile to the host inventory query and to the SharePoint > 0.Collection Job
 Group.

 SharePoint Custom Host List
 Create a custom host list containing the target hosts for which the Connection Profile just created
 contains credentials. For SharePoint Online, the target host needs to be the organization’s
 SharePoint instance.

 If the target hosts are located within a specific OU within the domain, then the StealthAUDIT Host
 Discovery Wizard can be used. Scope the discovery query task by selecting the Query an Active
 Directory server (General) option on the Source page, and then by navigating to the OU on the
 Active Directory page. See the Query an Active Directory Server (General) Source Option section
 of the StealthAUDIT User Guides v11.0 for additional information.

 A custom host list can be manually created by entering the host names, or it can be imported
 from either a CSV file or a database table. See the Add Hosts section of the StealthAUDIT User
 Guides v11.0 for additional information.

 Assign the custom host list to the SharePoint > 0.Collection Job Group.

Doc_ID 736                                                                                        20

             Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
StealthAUDIT®
Stealthbits Activity Monitor®

                                More Information
 Identify threats. Secure data. Reduce risk.

 Stealthbits, now part of Netwrix is a data security software company focused on protecting an
 organization’s credentials and data. By removing inappropriate data access, enforcing security
 policy, and detecting advanced threats, we reduce security risk, fulfill compliance requirements,
 and decrease operations expense.

 For information on our products and solution lines, check out our website at
 www.stealthbits.com or send an email to our information center at info@stealthbits.com.

 If you would like to speak with a Stealthbits Sales Representative, please contact us at
 +1.201.447.9300 or via email at sales@stealthbits.com.

 Have questions? Check out our online Documentation or our Training Videos (requires login):
 https://www.stealthbits.com/documentation. To speak to a Stealthbits Representative: please
 contact Stealthbits Support at +1.201.447.9359 or via email at support@stealthbits.com.

 Need formal training on how to use a product more effectively in your organization? Stealthbits is
 proud to offer FREE online training to all customers and prospects! For schedule information,
 visit: https://www.stealthbits.com/on-demand-training.

Doc_ID 736                                                                                           21

             Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
You can also read