Control 1.7 — Troubleshooting: Comprehensive Audit Logging and Compliance
Control: 1.7 — Comprehensive Audit Logging and Compliance Pillar: Pillar 1 — Security Audience: Purview Audit Admin, Purview Compliance Admin, Exchange Online Admin (Organization Configuration role), SOC Analyst, Entra Security Admin, Power Platform Admin, Azure Storage Account Owner, AI Governance Lead, FSI Compliance Officer, General Counsel Companion playbooks: Portal walkthrough · PowerShell setup · Verification & testing
Scope. This troubleshooting playbook covers operational, evidentiary, and regulatory failure modes for the Control 1.7 audit-logging surface — Microsoft 365 Audit (Standard / Premium / 10-Year add-on), the
CopilotInteraction/ConnectedAIAppInteraction/AIAppInteraction/MicrosoftCopilotStudiorecord types, the PAYG opt-in for non-Microsoft AI events, Dataverse environment-level and per-table audit, the EntraagentSignInandMicrosoftServicePrincipalSignInLogspreview surfaces, the unified audit search cmdlet and the strategic Microsoft Graphsecurity/auditLog/queriesAPI, Sentinel ingestion via the Office 365 Management Activity API connector, and the downstream WORM / 17a-4(f) preservation tier.Every scenario is organized as Symptom → Likely Cause → Diagnostic → Resolution → What good looks like. Read §1 FSI Incident Handling before remediating any production issue — for record-keeping controls the order of operations is preserve evidence first, remediate second.
Hedging note. This playbook helps meet, and is recommended to support compliance with, the regulations cited below. It does not by itself satisfy any reporting or recordkeeping obligation. Implementation requires legal review and organizations should verify each obligation against current rule text and the firm's written supervisory procedures (WSPs) before relying on the timing or scope guidance here.
Table of Contents
- §1. FSI Incident Handling — Read First
- §2. Capture vs Preservation vs Content — The Three Layers
- §3. Critical FSI Failure Scenarios
- Scenario 1 — Auditor wants prompt and response text; we only have audit metadata
- Scenario 2 — We assumed the 10-Year Audit Retention add-on satisfied SEC 17a-4(f)
- Scenario 3 —
AIAppInteractionevents missing - Scenario 4 —
ConnectedAIAppInteractionsometimes free, sometimes billable - Scenario 5 — Entra sign-in log doesn't show the "Is Agent" filter
- Scenario 6 —
Search-UnifiedAuditLogreturns empty forCopilotInteraction - Scenario 7 — Audit search timeout / 5,000-row cap hit
- Scenario 8 — Sentinel not ingesting
CopilotInteraction - Scenario 9 — Per-table Dataverse audit not enabled on Copilot Studio entities
- Scenario 10 — Audit retention dropped from Premium to Standard mid-year
- Scenario 11 — GCC High / DoD missing AI App PAYG / Premium event parity
- Scenario 12 — NYDFS 500.06 / 500.16 / 500.17 — single-artifact 12-month AI audit evidence
- Scenario 13 — Audit shows event but content is gone (mailbox deleted)
- Scenario 14 — FFIEC IT Examination wants tamper-evident audit
- §4. Anti-Patterns
- §5. Cross-References
1. FSI Incident Handling — Read First
When an audit-logging issue is detected, the order of operations for an FSI tenant is:
- Triage severity (§1.1)
- Determine reportability (§1.2)
- Preserve evidence BEFORE remediation (§1.3)
- Stand up compensating controls (§1.4)
- Remediate, then verify with the Verification & Testing suite
Skipping evidence preservation can convert a recoverable operational issue into a regulatory record-integrity finding.
1.1 Severity matrix
| Severity | Examples | Response window |
|---|---|---|
| SEV-1 — record-keeping integrity at risk | Audit ingestion silently disabled in production tenant; immutable storage policy unlocked or deleted; default retention silently applied to Copilot record types in Zone 3 (license shortfall); per-environment Dataverse audit off; preservation tier (immutable blob or 17a-4(f) archive) unavailable | Immediate (page on-call); preserve evidence within 1 hour |
| SEV-2 — audit gap with bounded blast radius | One Zone 2 environment Dataverse audit off; Sentinel connector down >24h; PAYG AIAppInteraction not enabled with non-Microsoft AI in use; agentSignIn forwarding to SIEM disabled in Zone 3 |
Within business day |
| SEV-3 — operational only | Search-UnifiedAuditLog throttling; SIEM connector latency above empirical ceiling but within documented variance; transient Get-AdminAuditLogConfig connection failures |
Routine queue |
1.2 Reportability decision tree
For SEV-1 and confirmed SEV-2, walk this tree before remediating. Do not rely on this list for legal advice — escalate to General Counsel / CCO immediately.
| Trigger | Likely reportable to | Notice clock |
|---|---|---|
| Confirmed loss of NPI audit trail | GLBA 501(b); state regulators per Reg S-P amendments (effective phased through 2026) | "As soon as practicable" — verify against current Reg S-P final rule |
| Cybersecurity incident affecting customer NPI in NY DFS-regulated entity | NY DFS Part 500.17(a) | 72 hours from determination |
| Material cybersecurity incident at SEC registrant | SEC 8-K Item 1.05 (issuers); Form ADV-C (advisers) | "Material" thresholds — escalate to GC/CCO |
| FINRA member firm — significant event | FINRA Rule 4530 | Rule-defined window per event category |
| Broker-dealer record preservation failure | SEC 17a-4(f) third-party access undertaking implications | Escalate to CCO immediately |
| Bank model risk event (validation evidence loss) | OCC 2011-12 / Federal Reserve SR 11-7 examiner notification | Per supervisory guidance |
| FCM / swap dealer / CPO record loss | CFTC 1.31 | Per CFTC guidance |
1.3 Evidence preservation BEFORE remediation
For every SEV-1 (and SEV-2 where reportability is plausible):
- Capture the failure state in place. Run
Test-UnifiedAuditEnabled,Get-UnifiedAuditLogRetentionPolicy,Get-AzStorageContainerImmutabilityPolicy(etc.) and save with SHA-256 sidecar before changing anything. The defective configuration is the evidence. - Capture the operational artifacts — Sentinel logs, error messages, transcript files. Hash on capture.
- Open a chain-of-custody record — file, captured-by, captured-at-UTC, hash, hand-off log.
- Preserve any in-flight search jobs — search jobs persist 30 days; export to immutable storage before they expire.
- Only then proceed to remediation. The remediation step itself is also evidenced (transcript + post-state capture).
1.4 Compensating controls during the gap
If audit ingestion is impaired or a record type is uncovered:
- Tighten Zone 3 agent change windows; require dual-control approval for any agent activation
- Increase Communication Compliance (Control 1.10) sampling on the affected agents
- Increase DSPM for AI (Control 1.6) review cadence on the affected workspaces
- Notify the user community: "audit telemetry temporarily impaired — high-risk activity will be surveilled by alternate means until audit ingestion is verified"
- Document the gap window with start/end UTC for the audit binder
1.5 Pre-escalation checklist
Before paging a Microsoft Support escalation, verify:
- Active session is Exchange Online PowerShell (not Security & Compliance PowerShell) —
(Get-ConnectionInformation).ConnectionUri - RecordType used is in the live
AuditLogRecordTypeenumeration - Search used
-SessionCommand ReturnLargeSet -SessionIdpagination, or migrated to the Graph audit search API - Date window is within retention horizon for that record type / user license
- User account running the search holds
Audit LogsorView-Only Audit Logs - Tenant audit ingestion is
True(Test-UnifiedAuditEnabledfrom EXO) - Custom retention policy explicitly names the record type (default policy excludes Copilot)
- License entitlement gap report is empty for the user/event in question
- PAYG enablement state captured if
AIAppInteractioninvolved - Sovereign cloud endpoint correct for tenant
- Module versions captured and within the CAB-pinned range
- End-to-end latency measured and outside empirical ceiling (not a fabricated SLA)
2. Capture vs Preservation vs Content — The Three Layers
Most of the failure modes documented below collapse to one of three layer confusions. Internalize this picture before triaging:
| Layer | What it is | Microsoft 365 product | What it cannot do alone |
|---|---|---|---|
| Capture (Audit) | Operational telemetry — who did what, when, against which agent/resource | Microsoft 365 Audit (Standard / Premium / 10-Year add-on) | Does not preserve verbatim prompt/response text; is not a SEC 17a-4(f) electronic recordkeeping system on its own |
| Content (Substrate) | The verbatim prompt and response text for Microsoft 365 Copilot interactions | Microsoft 365 Substrate (per-user Copilot interactions mailbox), surfaced via DSPM for AI (Control 1.6), eDiscovery (Premium) (Control 1.19), and Communication Compliance (Control 1.10) | Does not by itself produce a regulator-ready chain-of-custody artifact |
| Preservation (17a-4(f) tier) | Long-horizon, regulator-attested books-and-records vault | Azure immutable blob storage (Cohasset-attested) or a third-party SEC 17a-4-attested archive (Smarsh, Global Relay, Proofpoint, Mimecast, Bloomberg Vault, Veritas EV.cloud) or the October 2022 audit-trail alternative (DEO/DTP undertaking + independent assessment) | Does not generate the activity timeline; consumes exports from the Capture and Content layers |
A complete FSI program for AI agent communications chains all three: Audit produces the activity record and the message-ID join keys → Substrate (via DSPM/eDiscovery/Comm Compliance) yields the verbatim content → the preservation tier locks both into a 17a-4(f)-attested vault. When an examiner says "show me the prompt that produced this output and prove it has not been altered since June 2024", you are answering across all three layers, not one.
3. Critical FSI Failure Scenarios
Scenario 1 — Auditor wants prompt and response text; we only have audit metadata
Symptom. Examiner (FINRA, SEC, OCC, or internal audit) requests the verbatim prompt and the verbatim response for a CopilotInteraction event surfaced from Search-UnifiedAuditLog. The compliance team exports the audit JSON, opens it, and finds Messages[].ID, Messages[].IsPrompt, AgentId, ModelTransparencyDetails.ModelProviderName, JailbreakDetected, XPIADetected — but no prompt or response body.
Likely cause. Capture-vs-content layer confusion. The team designed evidence collection assuming Search-UnifiedAuditLog would return the chat text. Per Microsoft Learn — Audit logs for Copilot and AI activities (April 2026 verification window), the CopilotInteraction audit record carries interaction metadata and message IDs only. The verbatim prompt and response live in the Microsoft 365 Substrate (the per-user Copilot interactions mailbox) and are retrieved through DSPM for AI, eDiscovery (Premium), or Communication Compliance.
Diagnostic.
# 1. Confirm the audit record carries metadata only
$rec = Search-UnifiedAuditLog `
-StartDate (Get-Date).AddDays(-7) -EndDate (Get-Date) `
-RecordType CopilotInteraction -ResultSize 1 -SessionCommand ReturnLargeSet
($rec.AuditData | ConvertFrom-Json) | Select-Object -Property AgentId, AgentName, `
@{n='MessageIDs';e={$_.Messages.ID}}, `
@{n='HasPromptText';e={[bool]($_.Messages | Where-Object { $_.PSObject.Properties.Name -contains 'Body' })}}
# Expected: HasPromptText = False — the audit record is metadata only.
Confirm Substrate-tier retrieval is configured: DSPM for AI is enabled (Control 1.6), Copilot interactions are in scope of an eDiscovery (Premium) hold (Control 1.19), and Communication Compliance has a policy targeting AI-generated communications (Control 1.10).
Resolution.
- Document the capture/content distinction in your Written Supervisory Procedures (WSPs) so this does not recur.
- Retrieve the verbatim content via the Substrate path appropriate to the request:
- Investigation / supervisory review → Communication Compliance (Control 1.10) — open the policy match, read transcript in place.
- Regulator / litigation pull → eDiscovery (Premium) (Control 1.19) — place the user(s) on hold, build a search using the message IDs from the audit record as the join key, export the review set.
- Compliance manager spot-read → DSPM for AI (Control 1.6) — view chat transcript directly from the DSPM for AI experience.
- Hand the auditor the paired artifact: audit record (timeline, who/what/when, message IDs) + content artifact (verbatim text exported via the chosen Substrate path). Both go into the evidence binder with SHA-256 sidecars.
- If the request relates to a books-and-records record set, also export the content artifact to the firm's 17a-4(f) preservation tier (see Scenario 2).
What good looks like. WSP §"AI Agent Communications Recordkeeping" explicitly names (a) Audit as the activity tier, (b) Substrate via DSPM/eDiscovery/Comm Compliance as the content tier, and (c) the 17a-4(f) preservation tier. Compliance team can produce a paired artifact (metadata + verbatim text) for any CopilotInteraction event within the firm's documented response window.
Scenario 2 — We assumed the 10-Year Audit Retention add-on satisfied SEC 17a-4(f)
Symptom. Mock examination or independent assessment finds that the firm's broker-dealer books-and-records preservation strategy for AI agent communications relies solely on the per-user 10-Year Audit Log Retention add-on. No WORM-format vault, no Cohasset-attested storage, no DEO/DTP undertaking, no third-party 17a-4 archive. The firm's response to "show me your 17a-4(f) attestation" is to point at the audit retention SKU.
Likely cause. Capture-vs-preservation conflation. The 10-Year add-on extends Microsoft 365 Audit retention to ten years for covered record types, but Microsoft 365 Audit (Standard, Premium, and the 10-Year add-on inclusive) is operational telemetry — it is not a SEC 17a-4(f)-compliant electronic recordkeeping system on its own. The "Capture vs Preservation" warning at the top of the Control 1.7 doc calls this out explicitly.
Diagnostic. Walk this checklist with Compliance and General Counsel:
- Does the firm have a Cohasset-attested WORM tier holding the books-and-records record set? (Azure immutable blob storage with a time-based retention policy in the locked state qualifies — Cohasset has attested it for SEC 17a-4(f), CFTC 1.31, and FINRA 4511.)
- Or, is the firm relying on the October 2022 audit-trail alternative (compliance date 3 May 2023)? If yes, are the DEO representation or DTP undertaking and the independent records-management assessment on file?
- Or, does the firm journal/capture the AI content tier into a third-party SEC 17a-4-attested archive (Smarsh Enterprise Archive, Global Relay Archive, Proofpoint Enterprise Archive, Mimecast Cloud Archive, Bloomberg Vault, Veritas Enterprise Vault.cloud)?
- Is the DTP undertaking, where applicable, on file with FINRA?
If all three boxes are unchecked, the firm has a preservation gap, regardless of how long the audit log is retained.
Resolution. Choose one of the three preservation paths and stand it up:
- Azure immutable blob storage path. Create a storage account, container, and a time-based retention policy in the locked state. Periodically export Substrate content (Copilot interactions) plus the paired audit records to that container. The
Get-AzStorageContainerImmutabilityPolicycmdlet should reportState = Locked. This is the lowest-friction option for Microsoft-stack-aligned firms. - Third-party 17a-4-attested archive. Configure journaling/capture from the M365 Substrate into the chosen vendor (Smarsh / Global Relay / Proofpoint / Mimecast / Bloomberg Vault / Veritas EV.cloud). The vendor maintains its own 17a-4(f) attestation; obtain and file the current attestation letter.
- Audit-trail alternative path. Document that the system preserves original records and a complete time-stamped audit trail of all modifications and deletions; obtain a Designated Executive Officer (DEO) representation or a Designated Third Party (DTP) undertaking; commission and file the independent records-management assessment.
In all three cases, the 10-Year audit retention add-on remains useful as the activity-trail layer, but it is no longer being asked to play the preservation role.
What good looks like. Audit binder contains: (a) Cohasset attestation letter (or equivalent vendor attestation, or DEO/DTP undertaking + independent assessment), (b) evidence the preservation policy is locked (immutable storage policy in Locked state, or vendor attestation), (c) the export pipeline runbook from Substrate → preservation tier with SHA-256 manifests, and (d) a WSP section that explicitly disclaims reliance on the 10-Year audit add-on as the 17a-4(f) layer.
Scenario 3 — AIAppInteraction events missing
Symptom. Compliance team is monitoring use of non-Microsoft AI assistants (ChatGPT, Claude, Gemini, etc.) via the unified audit log. Search-UnifiedAuditLog -RecordType AIAppInteraction returns zero rows, even though endpoint telemetry confirms users are interacting with these services from managed devices.
Likely cause. AIAppInteraction is a PAYG-only record type (per the Control 1.7 control description) and requires explicit enablement, plus an upstream capture mechanism. Common gaps:
- Audit pay-as-you-go (PAYG) billing is not opted-in for the tenant.
- Network/browser DLP is not configured to capture non-Microsoft AI traffic — Edge for Business unmanaged-AI policy (Control 1.5) is the upstream feeder for the
AIAppworkload. - Affected users lack the appropriate license (Audit Premium tier prerequisites).
- Tenant is in a region or sovereign cloud where the PAYG
AIAppInteractionevent is not yet at parity (see Scenario 11). - Date window is older than the 180-day retention horizon for PAYG-captured records.
Diagnostic.
# 1. Confirm tenant audit ingestion
Connect-ExchangeOnline
(Get-AdminAuditLogConfig).UnifiedAuditLogIngestionEnabled # must be True
# 2. Confirm PAYG opt-in via the Microsoft Purview portal
# Settings > Audit > Pay-as-you-go > AIAppInteraction = Enabled
# (No first-party PowerShell cmdlet exposes this state at the time of writing —
# screenshot the portal state and hash for the evidence binder.)
# 3. Confirm the AIApp DLP feeder
Get-DlpCompliancePolicy | Where-Object { $_.Workload -match 'AIApp|Endpoint|Browser' } |
Select-Object Name, Enabled, Mode, Workload
# 4. Confirm the audit window does not exceed 180 days for PAYG records
$start = (Get-Date).AddDays(-30)
Search-UnifiedAuditLog -StartDate $start -EndDate (Get-Date) `
-RecordType AIAppInteraction -ResultSize 10 -SessionCommand ReturnLargeSet
Verify in the Microsoft Purview portal: Settings > Audit > Pay-as-you-go billing for current PAYG enablement scope, and cross-check against the live Microsoft Purview billing models page.
Resolution.
- Enable PAYG for
AIAppInteractionin the Microsoft Purview portal. Capture the change with a screenshot and hash it for the audit binder. - Configure or extend the Edge for Business unmanaged-AI policy and the network DLP rules per Control 1.5 so non-Microsoft AI traffic is being captured upstream.
- Validate license entitlements for the affected user population.
- Re-run the audit search after the documented propagation window (allow up to 24 hours for first events to surface).
- Add a recurring verification job (see Verification & Testing) that alerts on any 24-hour window of zero
AIAppInteractionevents when DLP telemetry confirms upstream activity.
What good looks like. PAYG opt-in screenshot on file; DLP/Edge-for-Business policy state evidenced; Search-UnifiedAuditLog -RecordType AIAppInteraction returns events within the empirical latency ceiling for the tenant; daily verification job is green; 180-day horizon documented in WSPs and longer retention sourced from the Substrate / preservation tier rather than from PAYG audit alone.
Scenario 4 — ConnectedAIAppInteraction sometimes free, sometimes billable
Symptom. Finance / IT operations sees inconsistent billing line items for ConnectedAIAppInteraction events. Some workloads are included in Audit (Standard) at no incremental cost; others land on the PAYG meter. Admins are unable to predict the cost of enabling a new agent.
Likely cause. This is expected behavior, not a defect. Per the Control 1.7 RecordType description (verified against Microsoft Learn April 2026):
- Microsoft-built Copilot Studio agents and other Microsoft AI applications surfaced via Connected AI App are included in Audit (Standard) at no incremental cost.
- Some scenarios under the same
ConnectedAIAppInteractionRecordType — specifically, interactions with non-Microsoft AI apps surfaced via Connected AI App — fall under Audit pay-as-you-go (PAYG) billing and require explicit PAYG opt-in.
The single RecordType name spans both regimes; the split is by app provenance, not by event shape.
Diagnostic. Build a per-app inventory and tag provenance:
# Pull a 30-day sample and aggregate by ApplicationId / app name
$start = (Get-Date).AddDays(-30); $end = Get-Date
$rows = Search-UnifiedAuditLog -StartDate $start -EndDate $end `
-RecordType ConnectedAIAppInteraction -ResultSize 5000 -SessionCommand ReturnLargeSet
$rows | ForEach-Object {
$a = $_.AuditData | ConvertFrom-Json
[pscustomobject]@{
AppId = $a.ApplicationId
AppName = $a.ApplicationDisplayName
Provider = $a.ModelTransparencyDetails.ModelProviderName
}
} | Group-Object AppId, AppName, Provider | Sort-Object Count -Descending |
Select-Object Count, Name
Then, for each AppId, consult the live Microsoft Purview billing models page for the current free-vs-PAYG split. Do not hardcode the split into a runbook — Microsoft has revised the boundary more than once and is expected to continue to do so.
Resolution.
- Treat the Microsoft Learn billing page as the source of truth; link to it from the runbook rather than restating its contents.
- Maintain an internal app-provenance register that flags each Connected AI App entry as
Microsoft-built(free under Audit Standard) orNon-Microsoft / PAYG-billable. - Before enabling a new Connected AI App, verify its billing classification and update the register.
- Reconcile finance billing exports against the register monthly; surface drift as a SEV-3.
What good looks like. App-provenance register exists and is reviewed monthly; finance billing matches expectations within tolerance; runbooks point to the live Microsoft Learn billing page rather than asserting a fixed split; new Connected AI App enablement passes through a billing-classification check.
Scenario 5 — Entra sign-in log doesn't show the "Is Agent" filter
Symptom. Operator follows an older runbook that says "in Entra > Sign-in logs, apply the Is Agent = Yes filter chip." The filter is not present in the current UI. Operator cannot confirm whether agent sign-ins are being captured.
Likely cause. Filter affordance naming and placement has shifted across recent Entra UI revisions. As of the April 2026 verification window, the Entra Sign-in logs page exposes four sign-in types (Interactive user / Non-interactive user / Service principal / Managed identity) plus a separate Agent activity entry on the Monitoring & health page. A literal "Is Agent = Yes" filter chip on the main Sign-in logs page is not the documented affordance. The earlier label should not be hardcoded into runbooks.
Diagnostic.
- Microsoft Entra admin center > Identity > Monitoring & health > Sign-in logs — inspect the available filter chips. Document the current names verbatim.
- Microsoft Entra admin center > Identity > Monitoring & health > Agent activity — verify the Agent activity log surface is present and capturing events for known agent identities.
- If unsure whether
agentSignInevents are being emitted at the API level, check via diagnostic settings:
# Confirm diagnostic settings for the tenant include sign-in log streams
Get-AzDiagnosticSetting -ResourceId "/providers/Microsoft.aadiam" |
Select-Object Name, @{n='Logs';e={ $_.Log | Where-Object Enabled | Select-Object -ExpandProperty Category }}
# Look for SignInLogs, NonInteractiveUserSignInLogs, ServicePrincipalSignInLogs,
# ManagedIdentitySignInLogs, MicrosoftServicePrincipalSignInLogs (preview),
# and any agentSignIn-related categories present in your tenant.
Resolution.
- Document the live filter affordance names from your tenant in the runbook — verbatim, dated, with a screenshot in the audit binder.
- Add a calendar reminder to revisit the documented label after each Entra UI revision (Microsoft typically refreshes the Monitoring & health surface several times per year).
- Where filter affordances are unstable, prefer API-side filtering (Microsoft Graph
signInsoragentSignInendpoints, or KQL on the ingested log) over UI-side filter chips. - Cross-reference Control 1.7 §"Agent Sign-In and Activity Audit Logs" for the canonical preview-feature scope.
What good looks like. Runbook contains a date-stamped, screenshot-backed entry for the live filter affordance; agent sign-ins are confirmed visible via at least one of (UI filter, Agent activity log, ingested Graph data); the runbook explicitly disavows the historic "Is Agent = Yes" label and includes a "verify after each Entra UI revision" reminder.
Scenario 6 — Search-UnifiedAuditLog returns empty for CopilotInteraction
Symptom. Search-UnifiedAuditLog -RecordType CopilotInteraction -StartDate (Get-Date).AddDays(-7) -EndDate (Get-Date) returns zero rows in a tenant with active Copilot users.
Likely cause. Multiple non-exclusive causes, ordered by frequency:
- Unified audit ingestion not enabled —
(Get-AdminAuditLogConfig).UnifiedAuditLogIngestionEnabledisFalse. - License gap — affected users lack a Copilot license, or lack the audit license tier required for the record type.
- Data-availability latency — Copilot record types can take longer than core workloads to surface (empirical typical latency is 60–90 minutes for core; Copilot, Power Platform, and Dataverse can take longer; allow up to 24 hours for first events).
- Time zone confusion —
-StartDate/-EndDateparameters are interpreted as UTC; a "yesterday" expressed in a non-UTC zone may bracket an empty window. - Permission scope mismatch — service principal (app-only) connections do not always carry the same audit-search rights as a delegated user with the
Audit Logsrole. - Audit Premium retention boundary — under the default Audit Premium retention policy, Copilot record types are not covered; retention falls back to 180 days, and queries beyond that window return empty.
- Session is Security & Compliance PowerShell, not Exchange Online —
Get-AdminAuditLogConfigfrom S&C PowerShell always returnsFalseforUnifiedAuditLogIngestionEnabledregardless of true tenant state.
Diagnostic.
# 1. Confirm session is EXO, not S&C PowerShell
(Get-ConnectionInformation).ConnectionUri # should be the EXO endpoint
# 2. Confirm tenant ingestion
Connect-ExchangeOnline
(Get-AdminAuditLogConfig).UnifiedAuditLogIngestionEnabled
# 3. Confirm role assignment for the operator
Get-RoleGroupMember "Audit Logs" | Where-Object { $_.PrimarySmtpAddress -eq (whoami) }
# 4. Confirm at least one user has a Copilot license
Get-MgUserLicenseDetail -UserId user@contoso.com |
Where-Object { $_.SkuPartNumber -match 'Copilot' }
# 5. Validate RecordType against the live enumeration
[Enum]::GetNames([Microsoft.Office.CompliancePolicy.PSCmdlets.AuditRecordType]) |
Where-Object { $_ -match 'Copilot' }
# 6. Re-issue the search with explicit UTC and pagination
$start = [DateTime]::UtcNow.AddDays(-7)
$end = [DateTime]::UtcNow
Search-UnifiedAuditLog -StartDate $start -EndDate $end `
-RecordType CopilotInteraction `
-SessionCommand ReturnLargeSet -SessionId "diag-$(Get-Random)" -ResultSize 5000
# 7. Confirm a custom retention policy explicitly names CopilotInteraction
Get-UnifiedAuditLogRetentionPolicy | Where-Object Enabled |
Sort-Object Priority |
Select-Object Name, Priority, RecordTypes, RetentionDuration
Resolution.
- Reconnect to Exchange Online if the session was S&C PowerShell.
- Enable unified audit ingestion if needed; allow up to 60 minutes for configuration propagation and longer for ingestion to begin.
- Reconcile licenses and re-run after the propagation window.
- Re-issue the query with explicit UTC and paginated
ReturnLargeSetsemantics. - If the date window exceeds 180 days, confirm a custom retention policy that explicitly names
CopilotInteractionis in effect, and that affected users hold the 10-Year Audit Log Retention add-on. - If the search will be repeated programmatically, migrate to the Graph audit search API (see Scenario 7).
What good looks like. A baseline CopilotInteraction query for any 24-hour window in the retention horizon returns rows within the tenant's documented empirical latency ceiling; Test-UnifiedAuditEnabled is True from EXO; the operator role and license entitlements are evidenced; the retention policy explicitly covers CopilotInteraction.
Scenario 7 — Audit search timeout / 5,000-row cap hit
Symptom. Search-UnifiedAuditLog either times out, throws TooManyRequests (HTTP 429), or returns at most 5,000 rows per call (or stops at the 50,000 session ceiling) when the operator knows the underlying event volume is much higher.
Likely cause. The cmdlet has documented per-call and per-session caps and per-tenant rate limits. The cmdlet itself is also legacy: Search-AdminAuditLog was deprecated 15 September 2024, and Search-UnifiedAuditLog, while still supported, is no longer the strategic forward path for high-volume programmatic access.
Resolution.
- Migrate to the Microsoft Graph audit search API. Use
POST https://graph.microsoft.com/v1.0/security/auditLog/queriesto submit a query, then poll/queries/{id}forstatus = succeeded, then page/queries/{id}/records. This is the strategic forward path and is built for higher volumes than the cmdlet.
# Sketch — Graph audit log queries
$body = @{
'@odata.type' = '#microsoft.graph.security.auditLogQuery'
displayName = 'CopilotInteraction-Q1-2026'
filterStartDateTime = '2026-01-01T00:00:00Z'
filterEndDateTime = '2026-03-31T23:59:59Z'
recordTypeFilters = @('copilotInteraction')
} | ConvertTo-Json
$q = Invoke-MgGraphRequest -Method POST `
-Uri 'https://graph.microsoft.com/v1.0/security/auditLog/queries' -Body $body
# Poll $q.id for status = succeeded, then page records
- Use server-side filtering. Push
RecordType,UserIds,Operations, and time windows into the API call rather than filtering client-side after a wide pull. - Chunk by
RecordType× time window. A 90-day pull across all Copilot record types is more reliable as 90 daily windows × N record types, executed serially with a small delay, than as a single wide call. - Serialize, do not parallelize. Aggressive parallel pagination across multiple sessions trips the per-tenant rate limit.
- For ad-hoc UI use, prefer the Audit search (new) experience in the Microsoft Purview portal, which uses the Graph API under the hood.
What good looks like. All scheduled audit pulls > 30 days or > 10,000 expected rows run via the Graph audit search API with chunked, server-side-filtered queries; the legacy cmdlet is reserved for ad-hoc one-shot diagnostic use; throttling exceptions are absent from steady-state operations.
Scenario 8 — Sentinel not ingesting CopilotInteraction
Symptom. Microsoft Sentinel workspace is connected to Microsoft 365 via the Office 365 Management Activity API connector, but OfficeActivity | where RecordType == "CopilotInteraction" returns no rows in the workspace.
Likely cause. Common gaps:
- The Office 365 Management Activity API connector scope does not include the workload that emits
CopilotInteraction(the connector exposes per-workload toggles —Exchange,SharePoint,AzureActiveDirectory,General, etc.). - Tenant license tier does not surface the record type to the connector.
- Sentinel workspace tier or daily-cap settings are dropping events.
- Analytics rule conditions are filtering events out before they land in the alert table (a
where-clause bug rather than an ingestion bug). - Connector polling latency is within Microsoft's empirical envelope but exceeds the operator's expectation.
Diagnostic.
- In the Sentinel workspace, Data connectors > Microsoft 365 (formerly Office 365) — confirm the connector is Connected and that all required workloads are checked.
- KQL — confirm any
OfficeActivityingestion at all:
OfficeActivity
| summarize Count=count() by RecordType, bin(TimeGenerated, 1h)
| where TimeGenerated > ago(24h)
| order by TimeGenerated desc
- KQL — confirm Copilot record types specifically:
OfficeActivity
| where RecordType in ("CopilotInteraction","ConnectedAIAppInteraction",
"AIAppInteraction","MicrosoftCopilotStudio")
| summarize Count=count() by RecordType, bin(TimeGenerated, 1h)
- Confirm the workspace daily cap is not being hit (workspace settings > Usage and estimated costs).
- Confirm the analytics rule scope and
whereclauses are not pre-filtering events away.
Resolution.
- Re-check connector workload scope; Copilot events flow under specific workloads — verify against the live connector documentation.
- Validate license entitlement and PAYG opt-in (Scenario 3) for the affected record types.
- Raise the workspace daily cap if events are being dropped; this is a tenant-cost decision that should go through CAB.
- Refer to Control 3.9 — Microsoft Sentinel Integration for the canonical Sentinel ingestion architecture for AI audit events.
- Document the empirical end-to-end latency (audit emit → Sentinel
OfficeActivity) for the tenant and alert on deviations from that measured ceiling, not on a fabricated SLA.
What good looks like. OfficeActivity shows non-zero counts for all four AI record types within the documented empirical latency ceiling; analytics rules fire on test events; daily-cap budget is sized for AI volumes; Control 3.9 cross-reference is reflected in the Sentinel runbook.
Scenario 9 — Per-table Dataverse audit not enabled on Copilot Studio entities
Symptom. Environment-level Dataverse auditing is enabled in the Power Platform Admin Center, but ConnectedAIAppInteraction and Dataverse audit reports show no record of Copilot Studio agent admin events (agent created, published, modified, deleted; component changes; collection changes).
Likely cause. Dataverse audit operates at two layers — environment-level (master switch) and per-table (per-entity opt-in). Copilot Studio agent admin events are emitted by the bot, botcomponent, botcomponentcollection, botversion, botpublishhistory, and botprocessversion entities, and per-table audit must be explicitly enabled on each.
Diagnostic.
# Using Microsoft.PowerApps.Administration.PowerShell + Dataverse Web API
$envUrl = 'https://contoso.crm.dynamics.com'
$tables = @('bot','botcomponent','botcomponentcollection',
'botversion','botpublishhistory','botprocessversion')
foreach ($t in $tables) {
$meta = Invoke-RestMethod -Uri "$envUrl/api/data/v9.2/EntityDefinitions(LogicalName='$t')?`$select=LogicalName,IsAuditEnabled" `
-Headers @{ Authorization = "Bearer $token" }
[pscustomobject]@{ Table = $t; AuditEnabled = $meta.IsAuditEnabled.Value }
}
# Expected: AuditEnabled = True on all six.
Resolution.
- Portal path. Power Apps Maker portal > select the environment > Tables > select the table (e.g.,
bot) > Properties > Advanced options > under "Rows in this table" check Audit changes to its data > Save. Repeat for the six entities listed above. - PowerShell / Web API path. Patch each
EntityDefinition:
foreach ($t in $tables) {
$body = @{ IsAuditEnabled = @{ Value = $true } } | ConvertTo-Json
Invoke-RestMethod -Method PATCH `
-Uri "$envUrl/api/data/v9.2/EntityDefinitions(LogicalName='$t')" `
-Headers @{ Authorization = "Bearer $token"; 'Content-Type' = 'application/json' } `
-Body $body
}
- Trigger a test admin event (publish a sandbox agent) and confirm a corresponding row appears in the Dataverse audit log and in
Search-UnifiedAuditLog -RecordType ConnectedAIAppInteractionwithin the documented latency window. - Note the May 2026 Dataverse change: from May 2026, before/after field values will no longer be included in audit events sent to Microsoft Purview. For field-level change retention plan to retrieve from the Dataverse Web API
auditdetailsendpoint or via Synapse Link audit export.
What good looks like. All six bot-family entities show IsAuditEnabled = True in every regulated environment; a fresh admin event on a sandbox agent surfaces in ConnectedAIAppInteraction within the empirical latency ceiling; the May-2026 Dataverse change is on the migration calendar.
Scenario 10 — Audit retention dropped from Premium to Standard mid-year
Symptom. Quarterly evidence review discovers that a subset of users had their audit retention silently downgraded from Premium (one year, or up to ten years with the add-on) to Standard (180 days) at some point during the year. Events emitted before the downgrade are still within the Premium horizon, but the system can no longer guarantee Premium-tier coverage going forward, and there is a possible gap between the downgrade date and the discovery date.
Likely cause. Audit retention is a per-user license attribute evaluated at event-ingestion time. A license SKU change — Premium → Standard, or removal of the 10-Year add-on — silently re-tiers retention for that user from that point forward. Common triggers: cost-optimization sweep; reorg moving users to a different department's license pool; license SKU expiration without renewal; M&A integration license harmonization.
Resolution.
- Never downgrade audit licenses for users in scope of regulated workloads (broker-dealer associated persons, FCM swap-dealer-registered persons, OCC-supervised model owners, NY DFS Covered Entities). Add a hard constraint to the license-management workflow that prohibits the downgrade for users in regulated populations, with an exception path that requires Compliance and CCO sign-off.
- If a downgrade has already occurred:
- Identify the affected user population and the downgrade date(s) precisely (from license-change audit log).
- Reconstruct the missing-coverage period from alternative sources: the Substrate (still holds Copilot interactions per its own retention), DSPM for AI, eDiscovery, Communication Compliance, the Sentinel workspace (if Copilot events were ingested), and the 17a-4(f) preservation tier (if exports were running).
- Document the gap window precisely (start UTC, end UTC, affected users, affected record types) in the audit binder.
- Document the reconstruction methodology and the residual gap (the part you could not reconstruct).
- Re-license the affected users back to Premium / 10-Year add-on; verify with
Get-MgUserLicenseDetail. - Assess regulatory disclosure obligation. Walk the §1.2 reportability tree with General Counsel and CCO. For broker-dealers, books-and-records preservation gaps may have notification implications under SEC 17a-4(f) DTP undertakings. For NY DFS Covered Entities, NYDFS Part 500 may apply if NPI was implicated.
- Update WSPs to require dual-control on any license SKU change for users in regulated populations.
What good looks like. Regulated-population license guard is in place and tested; license-change audit alerts on any downgrade for users in scope; if a historical downgrade is found, the gap is reconstructed as far as the alternative sources allow, the residual is documented, and the WSPs prohibit recurrence.
Scenario 11 — GCC High / DoD missing AI App PAYG / Premium event parity
Symptom. A federal contractor or DoD-cleared business unit operating in GCC High or DoD discovers that one or more AI audit features available in commercial cloud — typically the PAYG AIAppInteraction capture, certain Audit Premium event types, or specific Connected AI App event coverage — are not yet at parity in the sovereign cloud.
Likely cause. Sovereign reality. Microsoft preview and PAYG features routinely lag commercial parity in GCC High and DoD. This is structural to the sovereign cloud release process and is not, on its own, a bug.
Resolution. Build a compensating evidence path and document it in the WSPs. The compensating path typically combines:
- Substrate-tier retrieval via the GCC High / DoD equivalents of DSPM for AI (Control 1.6), eDiscovery (Premium) (Control 1.19), and Communication Compliance (Control 1.10) — verify per-feature availability against the current sovereign-cloud documentation.
- Sentinel ingestion of the available record types in the sovereign cloud, with KQL detections covering as much of the missing-event surface as can be reconstructed from adjacent telemetry.
- Third-party SEC 17a-4-attested archive journaling, where the vendor offers a sovereign-cloud-compatible deployment.
- Endpoint / network DLP (Control 1.5) to capture non-Microsoft AI activity at the device or proxy layer when the cloud-side
AIAppInteractionevent is unavailable.
Verify sovereign endpoint configuration:
| Cloud | EXO parameter | Purview URL | PPAC URL |
|---|---|---|---|
| Commercial | -ExchangeEnvironmentName O365Default |
purview.microsoft.com |
admin.powerplatform.microsoft.com |
| GCC | (commercial endpoints — verify per tenant) | (verify) | gcc.admin.powerplatform.microsoft.us |
| GCC High | -ExchangeEnvironmentName O365USGovGCCHigh |
purview.microsoft.us |
high.admin.powerplatform.microsoft.us |
| DoD | -ExchangeEnvironmentName O365USGovDoD |
compliance.apps.mil |
admin.appsplatform.us |
What good looks like. Sovereign-cloud feature-parity gap is enumerated against the current Microsoft sovereign-cloud roadmap; each gap has a documented compensating evidence path (Substrate + Sentinel + DLP + third-party archive, as applicable); WSPs explicitly disclose the compensating model so examiners are not surprised.
Scenario 12 — NYDFS 500.06 / 500.16 / 500.17 — single-artifact 12-month AI audit evidence
Symptom. NY DFS examiner under Part 500 (specifically 23 NYCRR 500.06 audit trail, 500.16 incident response, and 500.17 notice of cybersecurity event) requests a single artifact showing all AI-related audit events for the past 12 months, joined across record types, with the preservation-tier export evidence demonstrating the artifact is anchored to the 17a-4(f) vault.
Likely cause. Not a defect — a normal NYDFS examiner request. Most firms have not pre-built the joined query and scramble to assemble it under a regulator clock.
Resolution. Pre-build the artifact as a named saved query so it can be re-run on demand. Two equivalent paths:
Path A — Microsoft Graph audit search API, scheduled monthly, output to immutable blob:
# Submit a 12-month query covering all four AI record types
$body = @{
'@odata.type' = '#microsoft.graph.security.auditLogQuery'
displayName = "NYDFS-500-AI-Audit-$(Get-Date -Format 'yyyyMMdd')"
filterStartDateTime = (Get-Date).AddMonths(-12).ToString('o')
filterEndDateTime = (Get-Date).ToString('o')
recordTypeFilters = @(
'copilotInteraction',
'connectedAIAppInteraction',
'aiAppInteraction',
'microsoftCopilotStudio'
)
} | ConvertTo-Json
$q = Invoke-MgGraphRequest -Method POST `
-Uri 'https://graph.microsoft.com/v1.0/security/auditLog/queries' -Body $body
# Poll $q.id, then page /queries/{id}/records, write output as NDJSON,
# SHA-256 hash, push to Cohasset-attested immutable blob container.
Path B — Sentinel workbook (preferred when Sentinel is the SIEM of record):
// NYDFS 500 — AI audit join, last 12 months
let lookback = 365d;
OfficeActivity
| where TimeGenerated > ago(lookback)
| where RecordType in ("CopilotInteraction","ConnectedAIAppInteraction",
"AIAppInteraction","MicrosoftCopilotStudio")
| extend EventDate = bin(TimeGenerated, 1d)
| summarize EventCount = count(),
DistinctUsers = dcount(UserId),
DistinctAgents = dcount(tostring(parse_json(AuditData).AgentId))
by RecordType, EventDate
| order by EventDate asc, RecordType asc
Pin the workbook, schedule the monthly export, and persist exports to the 17a-4(f) preservation tier with SHA-256 sidecars. The deliverable handed to the examiner is three artifacts together: the joined query result, the chain-of-custody manifest, and the preservation-tier confirmation (immutable-blob policy state, or vendor archive attestation).
What good looks like. Saved query / workbook exists, has been run monthly for at least 12 months with outputs in the preservation tier, and can be produced for the examiner within the firm's documented response window. WSPs name the artifact and the responsible role.
Scenario 13 — Audit shows event but content is gone (mailbox deleted)
Symptom. Search-UnifiedAuditLog -RecordType CopilotInteraction shows events for a former employee, but eDiscovery / DSPM for AI / Communication Compliance retrieval comes back empty for the verbatim prompt and response. Investigation shows the user's mailbox was deleted as part of the leaver process, and the Substrate Copilot interactions mailbox was deleted with it.
Likely cause. No legal hold or records-management retention policy was in place on the affected user's Copilot interactions mailbox, and the standard leaver workflow purged it. The audit log (operational telemetry) survived because it is tenant-scoped, but the content store (per-user Substrate mailbox) did not.
Resolution.
- Enable Records Management retention (Control 2.6 for retention design; Control 1.9 for information-protection alignment) covering the Copilot interactions location, with a retention duration aligned to the applicable regulatory horizon (3 years for SEC 17a-4(b)(4) communications; 5 years for CFTC 1.31; longer per firm policy).
- Apply In-Place Hold / Litigation Hold to mailboxes of users in scope of regulatory recordkeeping at the moment of separation, before the leaver workflow runs the mailbox-delete step. Make this a hard gate in the leaver runbook.
- Sequence the leaver workflow so retention/hold is verified present before any delete or disable action.
- For the immediate incident, the content is not recoverable from the deleted mailbox. Reconstruct what is available from the preservation tier (if exports were running), document the residual gap, and walk the §1.2 reportability tree with General Counsel.
What good looks like. Retention policy covering Copilot interactions is in place and verified for all in-scope users; leaver runbook gates mailbox-delete on hold-present check; periodic verification job confirms holds are intact for the regulated population; no CopilotInteraction audit row exists for which the content store cannot be retrieved.
Scenario 14 — FFIEC IT Examination wants tamper-evident audit
Symptom. FFIEC IT Examination Handbook–driven examiner asks the firm to demonstrate that the AI audit trail is tamper-evident — that is, that no insider (including the highest-privileged tenant admin) can alter or delete historical audit records without detection.
Likely cause. Not a defect — a normal control attestation question. The firm needs to articulate the layered tamper-evidence model.
Resolution. Walk the examiner through the layered tamper-evidence story:
- Service-layer tamper-evidence (Microsoft 365 Audit). Microsoft 365 Audit is tamper-evident at the service level: no administrator role — including Global Administrator — can edit historical audit records via supported product surfaces. Audit ingestion is a one-way write; the cmdlet surface exposes only read and search operations against historical records. Reference the current Microsoft Purview Audit documentation for the canonical Microsoft statement.
- Disablement-detection layer. While history cannot be edited, audit ingestion itself can in principle be disabled by a tenant admin. Mitigate with an alerting rule that fires if
UnifiedAuditLogIngestionEnabledflips toFalse(this is itself an auditable configuration change). Wire the alert into the SOC pager. - Cryptographic / WORM evidence layer. For regulator-requested cryptographic evidence, supplement with: (a) Sentinel ingestion (Control 3.9) — the Sentinel workspace is a separate plane from the M365 Audit service, so collusion across both planes would be required to suppress an event; (b) immutable-blob export with a locked time-based retention policy (Cohasset-attested for SEC 17a-4(f), CFTC 1.31, FINRA 4511); (c) WORM seal on the export with SHA-256 manifests anchored to a separate identity boundary (different subscription, different RBAC, different break-glass).
- Independent validation layer. Periodic independent control testing per Control 3.4 — Audit and Compliance Reporting, and (for broker-dealers) the independent records-management assessment under the SEC 17a-4(f) audit-trail alternative.
# Verify the Azure immutable blob policy is locked
Get-AzStorageContainerImmutabilityPolicy `
-ResourceGroupName 'rg-fsi-audit-vault' `
-StorageAccountName 'fsiauditvault' -ContainerName 'm365-audit-export' |
Select-Object State, ImmutabilityPeriodSinceCreationInDays
# Expected: State = Locked
What good looks like. The firm can present a four-layer tamper-evidence narrative (service, disablement-detection, WORM/Sentinel, independent assessment); the immutable storage policy is in Locked state with hash sidecars; the disablement-detection alert exists and has been tested; control testing per Control 3.4 is current.
4. Anti-Patterns
| Anti-pattern | Why it's harmful |
|---|---|
| Equating "10-Year Audit Retention" with SEC 17a-4(f) compliance | Capture is not preservation. The add-on extends operational telemetry retention; it does not constitute a 17a-4(f) electronic recordkeeping system. (Scenario 2.) |
| Asking the audit log alone for prompt and response text | The CopilotInteraction record holds metadata and message IDs only. Verbatim text lives in the Substrate, retrieved via DSPM for AI / eDiscovery / Communication Compliance. (Scenario 1.) |
| Hardcoding the "Is Agent = Yes" filter chip into a runbook | Entra UI affordance naming has shifted across recent revisions. Document the live label and revisit after each UI revision. (Scenario 5.) |
Hardcoding the free-vs-PAYG split for ConnectedAIAppInteraction |
Microsoft has revised the boundary more than once. Link to the live Microsoft Learn billing page; do not restate the split in a static runbook. (Scenario 4.) |
-ErrorAction SilentlyContinue in audit verification scripts |
Hides exactly the failures you're verifying. Always Stop or Continue with logging. |
| Assuming the default Audit Premium retention policy covers Copilot record types | It does not — only AAD/Exchange/OneDrive/SharePoint. Always create a custom policy explicitly naming Copilot record types. (Scenario 6.) |
Reading Get-AdminAuditLogConfig from Security & Compliance PowerShell |
Always returns False for UnifiedAuditLogIngestionEnabled regardless of true tenant state. Use Exchange Online PowerShell. (Scenario 6.) |
Single-shot Search-UnifiedAuditLog -ResultSize 5000 for high-volume pulls |
Caps at 5,000 per call and 50,000 per session. Migrate to the Graph audit search API. (Scenario 7.) |
Using Search-AdminAuditLog for new automation |
Deprecated 15 September 2024. Migrate to Search-UnifiedAuditLog (legacy but supported) or the Graph audit search API (strategic). |
| Citing fabricated "15-minute SIEM SLA" or "24-hour audit SLA" | Microsoft does not publish a hard SLA. Examiners will challenge specific numerical claims. Document the empirical ceiling instead. (Scenario 8.) |
| Downgrading audit licenses on users in regulated populations to optimize cost | Silent retention re-tiering creates evidence gaps and possible disclosure obligations. Hard-gate the downgrade. (Scenario 10.) |
| Running the leaver workflow before applying retention/hold to the user's Copilot mailbox | Audit row survives, content does not — a worst-case examiner scenario. Sequence hold-before-delete. (Scenario 13.) |
Treating agentSignIn as GA or assuming a Frontier program gate without verification |
Preview surfaces and gating evolve; verify against the live tenant and Microsoft Learn before documenting. |
Stamping [PASS] immediately after Set-AdminAuditLogConfig |
Configuration takes up to 60 minutes to propagate; ingestion takes longer. Re-verify after the propagation window. |
5. Cross-References
- Control 1.5 — Microsoft Purview Data Loss Prevention … endpoint and browser DLP (Edge for Business unmanaged-AI policy) is the upstream feeder for the
AIAppworkload that surfacesAIAppInteractionevents. Without DLP capture, PAYG opt-in alone produces no events. (Scenarios 3, 11.) - Control 1.6 — Microsoft Purview DSPM for AI … one of three Substrate-tier paths for retrieving the verbatim prompt and response text that the audit record references by message ID. (Scenarios 1, 10, 11, 13.)
- Control 1.10 — Communication Compliance for AI Interactions … Substrate-tier path for policy-driven supervisory review of AI-generated communications; FINRA Rule 3110 alignment. (Scenarios 1, 10, 11, 13.)
- Control 1.19 — eDiscovery for Agent Interactions … Substrate-tier path for legal hold, collection, and review of Copilot interactions; the canonical regulator/litigation export channel. (Scenarios 1, 10, 11, 13.)
- Control 2.6 — Data Handling, Retention and Archival Procedures … Records Management retention design covering the Copilot interactions location; gates the leaver-workflow content-loss scenario. (Scenario 13.)
- Control 2.12 — Agent Lifecycle Management … leaver / mover sequencing for agent owners and users; ensures hold-before-delete and license-tier guard for regulated populations.
- Control 3.4 — Audit and Compliance Reporting … independent control testing layer in the tamper-evidence narrative; periodic attestation of the audit-logging stack. (Scenario 14.)
- Control 3.9 — Microsoft Sentinel Integration … canonical Sentinel ingestion architecture for AI audit events; second-plane tamper-evidence and the workbook channel for the NYDFS 12-month artifact. (Scenarios 8, 12, 14.)
Back to Control 1.7 | Portal Walkthrough | PowerShell Setup | Verification & Testing
Updated: April 2026 | Version: v1.4.0 | UI Verification Status: Current