LOG-05: Admin Activity Anomaly Detection
Frequently asked questions about implementing and managing the LOG-05 security control in Microsoft 365 and Entra ID.
QWhat is LOG-05 (Admin Activity Anomaly Detection)?▼
LOG-05 is a security control that compromised admin accounts often exhibit unusual patterns: signing in from new locations, performing bulk operations, or working at unusual hours. detecting these anomalies enables early response to account compromise. It requires that unusual admin behaviors trigger alerts and new sign-in locations for admins are flagged, bulk operations by admins are monitored, off-hours admin activity is tracked.
QWhy is Admin Activity Anomaly Detection important for Microsoft 365 security?▼
Compromised admin accounts often exhibit unusual patterns: signing in from new locations, performing bulk operations, or working at unusual hours. Detecting these anomalies enables early response to account compromise.
QHow do I implement LOG-05 in my tenant?▼
LOG-05 requires manual implementation. Requires Identity Protection or SIEM with correlation rules
QWhat license do I need for LOG-05?▼
This control requires Azure AD Premium P2 (included in Microsoft 365 E5) or standalone P2.
QWhich security baseline includes LOG-05?▼
LOG-05 is included in the Enhanced Security baseline (Level 2). This level adds stricter controls for security-conscious organizations.
5
Questions
1
Related Controls
—
Categorized
Related Resources
Still have questions?
Our security experts are here to help. Start a free trial and get personalized guidance for your Microsoft 365 environment.
Start Free Trial