Control 1.7: Comprehensive Audit Logging - Verification & Testing
This playbook provides verification and testing guidance for Control 1.7.
Automated Validation Available
For automated validation of these checks with drift detection and evidence hashing, see the Audit Compliance Manager (ACM) solution.
Verification Steps
Connection Requirements
Steps 1–6 are portal-based. Steps 7–8 require Connect-ExchangeOnline. Step 3 search can also be performed via Connect-IPPSSession using Search-UnifiedAuditLog.
| Step | Action | Expected Result |
|---|---|---|
| 1 | Navigate to purview.microsoft.com > Solutions > Audit | Audit dashboard displayed with Search and Audit retention policies tabs |
| 2 | Select Search tab and verify form fields | Search form with date range, activities, record types, and users fields visible |
| 3 | Search for CopilotInteraction record type (last 24 hours) | Results returned (if Copilot activity exists); zero results acceptable for new deployments |
| 4 | Navigate to Audit > Audit retention policies tab | Retention policies listed matching governance zone requirements (Zone 1: ≥180d, Zone 2: ≥1yr, Zone 3: ≥7yr) |
| 5 | Export a search result to CSV | Export completes successfully with CreationDate, UserIds, Operations, and AuditData columns |
| 6 | Verify SIEM integration (if applicable) | Query Sentinel/SIEM for recent audit events; logs should appear within 15 minutes of generation |
| 7 | Run Get-AdminAuditLogConfig via Exchange Online PowerShell (Connect-ExchangeOnline) |
UnifiedAuditLogIngestionEnabled shows True |
| 8 | Run Get-OrganizationConfig via Exchange Online PowerShell (Connect-ExchangeOnline) |
AuditDisabled shows False |
Evidence Pack (US-Focused Exam Readiness)
Purview Audit Access
- Screenshot: Purview Audit > Search page visible
- Screenshot/export: Operator role assignment evidence
Audit Ingestion Enabled
- PowerShell transcript:
Get-AdminAuditLogConfigshowingUnifiedAuditLogIngestionEnabled
Agent/Copilot Event Retrieval
- Screenshot: Audit search parameters and resulting record list
- Export: CSV export of representative result set
Retention Policy Configuration
- Screenshot: Purview Audit > Audit retention policies tab
- Change record: Ticket/approval reference for configuration changes
Export and Preservation (If Exporting to External Storage)
- Export log: Evidence of export run (job output, filenames, window)
- File hash: SHA-256 of each exported file
- Screenshot: Storage container and immutable policy settings
Monitoring and Alerting
- SIEM proof: Screenshot showing events ingested with timestamp alignment
Confirmation Checklist
- Unified audit logging is enabled (
UnifiedAuditLogIngestionEnabled: True) - Mailbox audit logging is enabled (
AuditDisabled: False) - Copilot/agent events are being logged (CopilotInteraction records appear in search)
- Retention policies configured per governance tier (Zone 1: ≥180d, Zone 2: ≥1yr, Zone 3: ≥7yr)
- Export capability verified (CSV export completes successfully)
- SIEM integration functional (if applicable)
- WORM storage configured (if broker-dealer — verify with compliance team)
- Dataverse environment-level auditing enabled (PPAC > Environments > Settings > Audit settings)
- Dataverse audit log retention meets zone requirements (Zone 1: ≥180d, Zone 2: ≥365d, Zone 3: ≥730d)
- Tenant-level Dataverse auditing enabled with User Sign-In and Activity logging
- Evidence artifacts collected and stored
SSPM Configuration Verification
Security Posture Assessment Test Cases
The following test cases validate Dataverse audit configuration points flagged by security posture assessments. Each test maps to a specific setting in the Configuration Hardening Baseline. Dataverse retention thresholds differ from Purview Audit retention — see the Portal Walkthrough for details.
| Test ID | Configuration Point | Expected Result | Portal Path | Evidence |
|---|---|---|---|---|
| SSPM-1.7-01 | Dataverse environment auditing | Enabled at environment level | PPAC > Environments > {env} > Settings > Audit and logs > Audit settings | Screenshot |
| SSPM-1.7-02 | Audit log retention period | ≥ 180d (Zone 1), ≥ 365d (Zone 2), ≥ 730d (Zone 3) | PPAC > Environments > {env} > Settings > Audit and logs > Audit settings | Screenshot |
| SSPM-1.7-03 | Tenant-level Dataverse auditing | Enabled with User Sign-In and Activity logging | PPAC > Security > Compliance > Auditing | Screenshot |
Test Procedures
SSPM-1.7-01: Dataverse Environment Auditing
- Navigate to PPAC > Environments > select target environment > Settings > Audit and logs > Audit settings
- Verify "Start Auditing" is enabled
- Verify "Log access" and "Read logs" checkboxes are enabled
- Pass criteria: Auditing is enabled at the environment level with access logging active
- Evidence: Screenshot showing audit settings page with all toggles enabled
SSPM-1.7-02: Audit Log Retention Period
- Navigate to PPAC > Environments > select target environment > Settings > Audit and logs > Audit settings
- Check the configured retention period
- Verify retention meets zone requirements:
- Zone 1 (Personal Productivity): ≥ 180 days
- Zone 2 (Team Collaboration): ≥ 365 days
- Zone 3 (Enterprise Managed): ≥ 730 days
- Pass criteria: Retention period meets or exceeds the zone-specific minimum
- Evidence: Screenshot showing retention configuration with zone classification documented
SSPM-1.7-03: Tenant-Level Dataverse Auditing
- Navigate to Power Platform Admin Center > Security > Compliance > Auditing
- Verify unified audit logging is enabled
- Verify "User Sign-In" logging is active
- Verify "Activity" logging is active
- Pass criteria: Tenant-level auditing is enabled with both sign-in and activity logging active
- Evidence: Screenshot showing Org Settings auditing page with all logging options enabled
Updated: February 2026 | Version: v1.3 | Classification: Verification Testing