Take a Product Tour
Explore the user interface, features, and capabilities of Logmanager
Quick Start Guide
Deploy Logmanager in your virtual environment
Join our Team
Explore open job opportunities and become part of a team building meaningful technology.
Suspicious cloud logins rarely exist in isolation. This workflow is useful because it shows how to pivot from an Office 365 alert into broader on-premises and cross-system activity. That makes it easier to determine whether the event is harmless, user-related, or part of a larger compromise.
Prefer watching?
Check the related video walkthrough:
Open the Office 365 overview dashboard and filter for alerts tagged as notified. Then open the specific log entry tied to the suspicious login. This gives you the username and source IP address needed for the next steps.
Filter for all activity from the suspicious IP address and remove filters that limit the view only to alerted events. This makes it possible to see the broader context, including activity that did not itself trigger an alert.
If the same source IP is tied to more than one username, investigate every related account. In the example, one of the users deleted many files, which immediately raises the severity of the incident.
Copy the suspicious username and switch to the general log overview dashboard. Review all related actions in other systems, including Windows. Look for account creation, password resets, account enabling, or adding users to groups, as these may indicate privilege escalation or persistence.
Contextual Alert to Identify Firewall Brute Force Attack Sources
Download the contextual alert template.
Parser for Wallix PAM (Bastion)
Download the ready-made parser for Wallix PAM (Bastion).
How to Configure Logmanager Backups on an SMB Server
In this guide, you prepare a Samba share on Ubuntu and then point Logmanager to that location for automated archiving.
How to Connect a FortiGate Firewall to Logmanager
Connecting FortiGate to Logmanager is useful because it centralizes traffic events, security logs, and operational activity from the firewall in one searchable platform.