HomeCII/OTMicrosoft has lost some customers' cloud security logs

Microsoft has lost some customers’ cloud security logs

Published on

spot_img

Microsoft faced a setback recently as it lost several weeks of cloud security logs, creating concerns among its customers who rely on these logs to detect cyber intrusions. The incident was privately disclosed to affected customers by Microsoft, assuring them that it was not the result of a security breach.

According to a report by Business Insider, the cause of the issue was identified as a bug in an internal monitoring agent that led to a failure in uploading log data to Microsoft’s internal logging platform. This resulted in incomplete log data for certain Microsoft services starting from 2 September 2024. The company’s engineering teams implemented a temporary workaround two weeks later by restarting the agent or server periodically to restart the log collection process. Despite these efforts, some log data was irretrievably lost.

The affected services included Azure Logic Apps, Azure Healthcare APIs, Microsoft Sentinel, Azure Monitor, Azure Trusted Signing, Azure Virtual Desktop, Power Platform, and Microsoft Entra. The loss of log data had implications for tenants’ ability to analyze data, detect threats, and generate security alerts, impacting the overall security posture of organizations using these services.

The incident underscored the critical importance of complete and accurate logs for security products to function effectively. Without proper logging, enterprise defenders and incident responders face challenges in identifying and mitigating security threats in a timely manner. Microsoft’s previous shortcomings in providing comprehensive cloud logging capabilities were highlighted when Chinese hackers breached email accounts of US organizations and government agencies last year. The lack of specific cloud logging features for customers without premium Microsoft Purview Audit accounts delayed the detection of the intrusion.

Following criticism and feedback from the cybersecurity community, Microsoft took steps to address these concerns. The company made logs available to all agencies using Microsoft Purview Audit, regardless of their license tier, and extended the default log retention period from 90 days to 180 days. These measures were aimed at enhancing transparency and accountability in cloud security practices, enabling customers to better protect their digital assets and sensitive information from evolving cyber threats.

Moving forward, Microsoft is expected to review its internal monitoring and logging processes to prevent similar incidents in the future. The company’s commitment to enhancing security controls and data protection mechanisms will be closely monitored by customers and industry experts to ensure that incidents like the recent loss of cloud security logs do not compromise the integrity and resilience of Microsoft’s cloud services.

Source link

Latest articles

Push for Digital Sovereignty: Essential Insights for CISOs

In early 2026, the French government made a significant announcement that sent ripples throughout...

How Integrated GIS Powers the Next Generation of Industrial Cyber Resilience

The Evolution of Cybersecurity: Bridging the Gap Between GIS and IT/OT Systems In an era...

Cyber Briefing – April 23, 2026 – CyberMaterial

Cybersecurity Update: Emergence of New Threats and Institutional Reactions The cybersecurity landscape continues to evolve...

Apple Resolves iOS Notification Issue Revealing Deleted Messages

Apple Issues Emergency Update to Address Notification Services Vulnerability In a significant move to enhance...

More like this

Push for Digital Sovereignty: Essential Insights for CISOs

In early 2026, the French government made a significant announcement that sent ripples throughout...

How Integrated GIS Powers the Next Generation of Industrial Cyber Resilience

The Evolution of Cybersecurity: Bridging the Gap Between GIS and IT/OT Systems In an era...

Cyber Briefing – April 23, 2026 – CyberMaterial

Cybersecurity Update: Emergence of New Threats and Institutional Reactions The cybersecurity landscape continues to evolve...