MS.EXO.13.1v1 - Mailbox auditing SHALL be enabled.

Information

Exchange Online user accounts can be compromised or misused. Enabling mailbox auditing provides a valuable source of information to detect and respond to mailbox misuse.

Solution

Mailbox auditing can be managed from the Exchange Online PowerShell. Follow the instructions listed on [Manage mailbox auditing in Office 365](https://learn.microsoft.com/en-us/microsoft-365/compliance/audit-mailboxes?view=o365-worldwide).

To check the current mailbox auditing status for your organization via PowerShell:

1. Connect to the Exchange Online PowerShell.

2. Run the following command:

`Get-OrganizationConfig | Format-List AuditDisabled`

3. An `AuditDisabled : False` result indicates mailbox auditing is enabled.

To enable mailbox auditing by default for your organization via PowerShell:

1. Connect to the Exchange Online PowerShell.

2. Run the following command:

`Set-OrganizationConfig -AuditDisabled $false`

See Also

https://github.com/cisagov/ScubaGear/tree/v1.5.0/

Item Details

Category: ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, IDENTIFICATION AND AUTHENTICATION, INCIDENT RESPONSE, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

References: 800-53|AC-2, 800-53|AC-3, 800-53|AC-4, 800-53|AC-5, 800-53|AC-6, 800-53|AC-16, 800-53|AC-17, 800-53|AC-18, 800-53|AC-19, 800-53|AC-20, 800-53|CA-7, 800-53|CM-2, 800-53|CM-3, 800-53|CM-5, 800-53|CM-6, 800-53|CM-7, 800-53|CP-6, 800-53|CP-7, 800-53|CP-9, 800-53|IA-2, 800-53|IA-5, 800-53|IR-5, 800-53|SC-4, 800-53|SC-36, 800-53|SI-3, 800-53|SI-4, 800-53|SI-7, 800-53|SI-12

Plugin: microsoft_azure

Control ID: c0b0aeec92401582b68437a7f9241a3df6dc3320f5ea0ea2b8de1fed8cf0e8bd