This article provides prerequisites and onboarding steps for Microsoft 365 Direct.
Quick Links
- Enable Console Access
-
Configure Microsoft Entra ID Protection in Expel Workbench (Premium P2 License Required)
Step 1: Enable Console Access
-
Sign into the Azure portal as a user who is assigned a limited administrator directory role or the Guest Inviter role.
-
In the navigation pane, click Microsoft Entra ID.
-
Under Manage, select Users.
-
Select New guest user.
-
On the New user page, click Invite user, fill out the email address (expel_analyst@expel.io), and optionally include a message.
-
Under roles, add the role Global Reader role.
-
Click Invite to automatically send the invitation to the guest user.
-
After you send the invitation, the user account is automatically added to the directory as a guest.
Step 2: Enable Microsoft 365 Audit Logging
Audit logging is required for Expel to provide detection and investigative value for Microsoft 365. The Microsoft 365 audit log records user and admin activity and holds the data for 90 days. Audit logging could already be running on your Microsoft 365 installation. So, the first thing to do is verify.
Verify Microsoft 365 Audit Logging Status
Use the Verify the auditing status for your organization instructions from Microsoft 365 support.
-
If audit logging is ON, skip to Step 3: Enable 365 Enterprise Application.
-
If audit logging is OFF, continue to Enable Microsoft 365 Audit Logging below.
Enable Microsoft 365 Audit Logging
You can use either the Microsoft 365 Security and Compliance Center or the Exchange Online PowerShell to activate audit logging.If you prefer PowerShell, skip to Option 2: Enable Audit Logging in Microsoft 365 With PowerShell in 3 Steps.
Option 1: Enable Audit Logging in Microsoft 365 Security and Compliance Center in 5 Steps
-
Log in to the Microsoft 365 Admin Portal with a global admin user or at minimum, a user with the Organization Management or Compliance Management roles.
-
Navigate to the Security & Compliance Center.
-
Navigate to Search & investigation > Audit log search.
-
Select Start recording user and admin activities.
- That’s it! Microsoft 365 makes some changes behind the scenes and begins recording activity in the audit log.
Note
This change can take about 24 hours to complete.
Option 2: Enable Audit Logging in Microsoft 365 With PowerShell in 3 Steps
-
Run the following PowerShell command to turn on audit log search in Microsoft 365:
Set-AdminAuditLogConfig -UnifiedAuditLogIngestionEnabled $true
-
That’s it! A message appears saying it can take up to 60 minutes for the change to take effect.
Step 3: Enable Microsoft 365 Enterprise Application
To integrate Microsoft 365 Direct with Expel, we need to create secure credentials to the API. We provide two options for enabling API access:
Usually enabling the Enterprise Application (Option 1) is the recommended approach. The second option is offered for cases where the absolute minimum permissions are required. In either case, the table below shows the required items to obtain during this step:
Item we need |
Description |
Azure Directory (tenant) ID |
A unique identifier for your Azure instance. Expel needs this information to route our API requests to the right place. |
Application (client) ID (Option 2 only) |
A unique identifier for the application you create that grants Expel the access it needs to your Microsoft 365 instance. |
Application (client) Secret (Option 2 only) |
The API secret that allows Expel to authenticate as the created application to your Microsoft 365 instance. |
Option 1: Enable Microsoft 365 Integration (Preferred)
-
As an Administrator, navigate to the Expel Admin Consent Page.
-
Review and accept requested permissions.
-
The Expel Microsoft 365 Integration app now appears under Enterprise Applications. Review properties and make sure that all permissions were properly granted. Note the Directory (Tenant) ID when viewing the Expel Microsoft 365 Integration application for use in later steps.
-
Skip to Step 4: Configure Microsoft 365 Direct in Expel Workbench.
Option 2: Create Custom Microsoft Entra ID Application
-
Log in to your Azure Active Directory account and open Microsoft Entra ID.
-
Navigate to App registrations and create a new app by clicking + New registration.
-
Fill in the application details. You can technically fill these in however you want, but we recommend the following:
-
Name - Expel Cloud Service.
-
Supported account types - accounts in this organizational directory only (first option).
-
-
After you fill out the fields, select Register to create the new application.
-
You will navigate automatically to the settings page for the Expel Cloud Service app you just created. If not, navigate to Azure Active Directory > App Registrations > View all applications > Expel Cloud Service (if you don’t see the new app).
-
Make a note of the Application (client) ID and Directory (tenant) ID for later.
-
Navigate to API permissions and select Add a permission.
-
Add these permissions for the Expel App:
-
Microsoft Graph API
-
AuditLog.Read.All
-
Directory.Read.All
-
Group.Read.All
-
IdentityRiskEvent.Read.All
-
SecurityEvents.Read.All
-
User.Read.All
-
-
Microsoft 365 Management APIs
-
ActivityFeed.Read
-
ActivityFeed.ReadDIp
-
ServiceHealth.Read
-
-
-
Select the appropriate API Category (for example, Microsoft Graph).
-
Select Application Permissions.
-
Select the appropriate permission(s) and Add Permissions.
-
Repeat these steps for each permission needed. Verify that:
-
All permissions are added as Application permissions and not Delegated permissions.
-
All permissions are assigned.
-
Consent is granted for the permissions by the AAD admin.
-
-
After permissions are assigned, select Grant admin consent and Yes at the prompt.
-
Navigate to Expel Cloud Service > Certificates & secrets to begin creating an API key (client secret). To create a new key, select +New client secret.
-
Add a description for the secret (for example, Expel API) and select 24 months for expiration. Select Add to create the secret.
-
You will see a new client secret (API Key) under Client secrets.
Note
Copy the value and save it for later. The client secret disappears after you navigate away from this screen.
Step 4: Configure Microsoft 365 Direct in Expel Workbench
-
In a new browser tab, log in to Expel Security Devices to add a Microsoft 365 (direct) security device.
-
Complete the fields as follows:
- SIEM - select Expel Cloud Service from the list.
- Name - enter a name that might help you more easily identify this integration; this name will display in Workbench under the Name column and is a text string that you can filter on.
- Location - select Microsoft Cloud.
- Tenant ID - use the Azure Directory (tenant) ID from Option 1 or Option 2.
- Client ID (Option 2 only) - use the Azure Application (client) ID created in Option 2.
- Client Secret (Option 2 only) - use the Application (client) Secret created in Option 2.
-
Select Save.
Step 5: Configure Microsoft Entra ID Protection in Expel Workbench (Premium P2 License Required)
- In a new browser tab, log into Expel Security Devices to add a Microsoft Entra ID Protection security device.
- Complete the fields as follows:
- SIEM - select Expel Cloud Service from the list.
- Name - enter a name that might help you more easily identify this integration; this name will display in Workbench under the Name column and is a text string that you can filter on.
- Location - select Microsoft Cloud.
- Tenant ID - use the Azure Directory (tenant) ID from Option 1 or Option 2.
- Client ID (Option 2 only) - use the Azure Application (client) ID created in Option 2.
- Client Secret (Option 2 only) - use the Application (client) Secret created in Option 2.
- Select Save.