Skip to content

Control 1.7: Comprehensive Audit Logging - Portal Walkthrough

This playbook provides portal configuration guidance for Control 1.7.


Prerequisites

  • Unified audit logging enabled at tenant level
  • E5 licenses assigned for extended retention
  • Retention requirements documented per regulation
  • SIEM integration requirements identified
  • Azure storage account created (if WORM required)

Accessing Audit

  1. Open Microsoft Purview
  2. Navigate to Audit in left navigation
  3. Select Search to query audit logs

If you don't see Audit:

  • Confirm your account has Purview Compliance Admin role
  • Confirm audit logging is enabled at tenant level
  • Allow for ingestion latency (30 min to 24 hours)

Audit Search Interface

Search Form Fields

Field Description
Date and time range (UTC) Start and end date for search
Activities - friendly names Select activities by friendly name
Activities - operation names Enter operation values (comma-separated)
Record Types Select record types to search
Users Users whose audit logs to search

Microsoft 365 Copilot Activities:

Activity Description
CopilotInteraction User interaction with Microsoft 365 Copilot
CopilotFeedback User feedback on Copilot response
CopilotPluginUsed Plugin invoked during interaction

Copilot Studio Activities:

Activity Description
AgentCreated New agent created
AgentPublished Agent published to channel
AgentModified Agent configuration changed
AgentInteraction User interaction with agent

Searching for Agent Activities

  1. Navigate to Audit > Search
  2. Set Date and time range for period of interest
  3. In Activities - friendly names, select Copilot or agent activities
  4. Optionally filter by Users or Workloads
  5. Enter a Search name for reference
  6. Click Search
  7. Review results and export as needed

Example Searches

Scenario Search Parameters
All Copilot interactions Activities: CopilotInteraction, Date: Last 30 days
Agent creation events Activities: AgentCreated, AgentPublished
Admin changes to agents Record Types: CopilotStudio, Activities: *Modified
User-specific activity Users: specific user, Activities: CopilotInteraction

Audit Retention Configuration

Standard vs Premium

Feature Audit (Standard) Audit (Premium)
Log retention 180 days Up to 10 years
Custom policies No Yes
High-value events No Yes

Creating Retention Policies

  1. Navigate to Audit > Audit retention policies tab
  2. Click + New audit retention policy
  3. Enter a descriptive Policy name (e.g., "FSI Zone 3 - 10 Year Retention")
  4. Set Duration to the retention period matching your governance zone
  5. Under Record types, select the audit record types to retain (e.g., CopilotInteraction, ExchangeAdmin)
  6. Under Users, select specific users or choose All users for organization-wide coverage
  7. Review the policy summary and click Save

FSI Retention Requirements

Zone Minimum Retention Recommended
Zone 1 180 days (Standard) 1 year
Zone 2 1 year 7 years
Zone 3 7 years 10 years

AI Communications Recordkeeping (FINRA 4511/3110)

FINRA Notice 25-07 Clarification

FINRA Regulatory Notice 25-07 (April 2025) addresses workplace modernization rules, not AI governance. It references AI only in the context of recordkeeping for AI-generated communications. For AI supervision requirements, refer to FINRA Rule 3110 (Supervision).

FINRA Rule 4511 requires complete records of AI-generated customer communications. Best practice guidance recommends complete interaction records (not summaries) for customer-facing agents.

Required Retention Fields

Field Requirement
Raw User Prompt Complete, verbatim
Complete AI Response Full text, no summarization
Timestamp UTC timestamp
User ID Authenticated identifier
Agent ID Canonical AgentID
Citations/Sources Required for RAG agents

Prohibited Practices

  • Summary-only retention
  • Metadata-only logging
  • Partial response capture
  • Prompt truncation

SEC 17a-4 Compliance Options

For broker-dealers, the October 2022 SEC amendments (effective May 2023) now allow either WORM storage or an audit-trail alternative for records preservation.

Options

Option Description
WORM Storage Traditional non-rewritable, non-erasable storage
Audit-Trail Alternative Maintains complete audit trail of all record modifications, preventing alteration without detectable trace
Azure Immutable Blob Storage Export to Azure with immutable policy (supports WORM)
Third-party Archive Vendor with WORM or audit-trail compliance
Microsoft 365 Audit Premium Extended retention (evaluate with compliance team for 17a-4 sufficiency)

SEC 17a-4 Amendment (October 2022)

The SEC's October 2022 amendments eliminated the mandatory WORM requirement, allowing broker-dealers to use audit-trail alternatives that achieve the same preservation goals. Consult with compliance and legal counsel to determine the appropriate approach.

Azure Immutable Storage Setup (If Using WORM)

  1. Create Azure Storage account
  2. Enable immutable blob storage
  3. Configure time-based retention (6 years minimum)
  4. Set up weekly automated export from Purview Audit
  5. Implement integrity verification

SIEM Integration

Export Options

Method Use Case
Manual export Ad-hoc investigations
Management Activity API Automated export
Azure Monitor Real-time streaming
Microsoft Sentinel Native integration

Dataverse Environment-Level Audit Configuration

Step 1: Enable Environment-Level Auditing

  1. Sign in to Power Platform Admin Center (https://admin.powerplatform.microsoft.com)
  2. Navigate to Environments and select the target environment
  3. Select Settings > expand Audit and logs > select Audit settings
  4. Enable "Start Auditing" to begin capturing Dataverse entity changes, user sign-ins, and security events
  5. Select Save

Repeat for every environment in your tenant.

Step 2: Configure Audit Log Retention Period

  1. In the same Audit settings page, locate "Retain these logs for"
  2. Open the dropdown and set the retention period:
  3. Zone 1 (Personal): 180 days minimum
  4. Zone 2 (Team): 365 days minimum
  5. Zone 3 (Enterprise): 730 days minimum (or select "Custom" / "Forever")
  6. For custom values, select "Custom" and enter the number of days
  7. Select Save

Retention Below 180 Days

Setting retention below 180 days does not meet minimum FSI regulatory requirements. If you observe any environment with retention below 180 days, remediate immediately.

Step 3: Enable Tenant-Level Dataverse Auditing Policy

  1. In Power Platform Admin Center, navigate to Security > Compliance > Auditing
  2. Enable the "Turn on Auditing" checkbox
  3. Additionally enable:
  4. "User Sign-In" — captures sign-in events across Dataverse environments
  5. "Activity" — captures entity-level activity and changes
  6. Select Save

Back to Control 1.7 | PowerShell Setup | Verification Testing | Troubleshooting


Updated: February 2026 | Version: v1.3