M365/Azure Logs Past Retention Period

Unified Audit Log (UAL) entries in Microsoft 365 or Azure AD sign-in logs have expired beyond the default 90-day (E3) or 180-day (E5) retention window. Historical evidence of initial access, mailbox abuse, or OAuth consent grants is no longer available in the tenant.

Signals

  • UAL search returns no results for dates earlier than the retention boundary
  • Azure AD sign-in log queries return HTTP 404 or empty result sets for the target timeframe
  • The tenant license is E3/G3 with default 90-day retention and the incident predates that window
  • Compliance search in Purview shows no matching audit records for the suspected timeframe

Pivot Actions

  1. 1.Check if a SIEM (Sentinel, Splunk) was ingesting M365/Azure AD logs -- indexed data survives the tenant retention
  2. 2.Query mailbox audit logs independently (they have separate retention, up to 1 year for E5 mailboxes)
  3. 3.Export Azure AD Provisioning Logs and Enterprise App consent logs which may have longer retention
  4. 4.Engage Microsoft Premier Support to request a backfill or extended log retrieval if contractually available
  5. 5.Review mail-flow (transport) rules and inbox rules which persist as configuration, not log entries, and reveal attacker changes

Alternate Evidence Sources

  • SIEM-indexed M365 UAL and Azure AD data ingested before retention expiry
  • Mailbox audit logs retained independently of UAL (up to 1 year)
  • Azure AD Provisioning and Enterprise Application logs