How to Search the Microsoft 365 Audit Log for SharePoint and OneDrive Deletion Events

Who Deleted that Document?

Many searches of the Microsoft 365 audit log are attempts to answer questions. A good example is to search the log to discover email deletion audit events to answer a question like “who deleted a specific message in a shared mailbox?”

The equivalent question for SharePoint Online and OneDrive for Business is “who deleted that document?” You might not care too much about deletions in OneDrive for Business accounts because these are personal storage under the control of individual users; the same might not be true for SharePoint Online deletions, especially in sites used by Microsoft Teams and Outlook Groups where the simplicity of the Microsoft 365 Groups membership model mandates that all members have equal access to group data. In a nutshell, any team or group member can delete any file in the site.

SharePoint’s Deletion Process

SharePoint routes deleted items through a two-stage recycle bin process. All group members can recover items from the first stage recycle bin. Items remain in the first stage recycle bin for 30 days and then move to the second stage. Only group administrators (owners) can recover items after they reach the second stage recycle bin, where they remain for another 63 days. Ninety-three days after their original deletion, SharePoint Online automatically removes the items permanently and they become irretrievable. That is, unless SharePoint Online is forced to retain files because they have a retention label or come within the scope of a retention policy. In that case, SharePoint Online keeps a copy of the file in the site preservation hold library until the retention period lapses (users being able to delete files with retention labels is a recent change).

The audit records captured for item deletions in the Microsoft 365 audit log are often the result of user activity. In other words, someone selects a document in a folder and deletes it. SharePoint Online (including OneDrive for Business) captures a FileDeleted event when this happens. However, other processes can remove items, including:

  • A retention policy applying to the site removes items after a set period.
  • An administrator deletes a user account, and the SharePoint system account removes items from the user’s OneDrive for Business account.

Users can access the site recycle bin and remove items from it. Often this is an innocent activity, but it can also be evidence that someone wants to remove an item that they don’t want to be found. When someone removes an item from the first stage recycle bin, SharePoint Online captures a FileDeletedFirstStageRecycleBin audit event. Retention policies can also remove items form the recycle bin. Only site administrators can access items in the second stage recycle bin (Figure 1). If they remove items from the second stage recycle bin, SharePoint Online captures a FileDeletedSecondStageRecycleBin audit event.

A suspiciously empty site recycle bin. Maybe the administrator should check the second stage...

SharePoint Online deletion
Figure 1: A suspiciously empty site recycle bin. Maybe the administrator should check the second stage…

In summary, SharePoint Online generates audit events as items move through site recycle bins to permanent deletion. Deletions are often user-initiated but can be the result of system processes. The Microsoft 365 audit log ingests the audit records approximately 15 minutes of them happening, and once the records are in the log, we can search for and report the events using the Search-UnifiedAuditLog cmdlet.

Of course, you can also look for these events using the audit log search feature in the Microsoft 365 compliance center but given the volume of audit events to deal with and the need to analyze information to make sense of what happened, it’s usually better to use PowerShell.

Searching for SharePoint Online Deletion Events

To illustrate the process, I created a script that you can download from GitHub. The script is very simple:

  • Set up search parameters (I used a 90-day search period, you can adjust as necessary).
  • Search for the three deletion events.
  • Examine the AuditData payload in each record and extract relevant information.
  • Sort the results by operation and date and export to a CSV file. I also output the results using the Out-GridView cmdlet (Figure 2) to make it convenient to see what’s found.

As the code is PowerShell, you can change it to meet your needs.

Report of SharePoint Online and OneDrive for Business file deletions
Figure 2: Report of SharePoint Online and OneDrive for Business file deletions

If you want to distribute the report in other ways, you could:

  • Format the content in HTML and send it via email (see this article for details).
  • Create the report in a SharePoint document library (the basics of how to do this is explained here; the scenario is a script running in a Azure Automation runbook but the technique of using PnP cmdlets is the same in “regular” PowerShell).
  • Post the report to a Teams channel or post a link to it in a message card created in a Teams channel using the inbound webhook connector. See this article for more information.

Watch the Volume of Audit Events

One thing to pay attention to is the volume of deletion events in large tenants. The Search-UnifiedAuditLog cmdlet can retrieve up to 5,000 audit records without doing anything special. To fetch more, you must either:

  • Break up the search to stay within the 5,000-record limit by running multiple limited searches (perhaps a daily search).
  • Set the SessionCommand parameter for Search-UnifiedAuditLog to ReturnLargeSet. This allows the search to return up to 50.000 records. You need to sort the data.

It might be advantageous to export the search results to an external repository. Many organizations use Splunk for this purpose because they want to keep Microsoft 365 audit data for longer than Microsoft does (90 days for Office 365 E3, 365 days for E5) and to use the search and analysis capabilities often found in dedicated log aggregator products. If you don’t have a copy of the Office 365 for IT Pros eBook (reporting and auditing chapter), you can read this discussion in the Microsoft Technical Community to understand the process.

11 Replies to “How to Search the Microsoft 365 Audit Log for SharePoint and OneDrive Deletion Events”

  1. Hi, Is this still valid as it looks like the unified audit logs are being pushed into compliance centre and changed?
    ” Audit Log Trimming
    Given this audit experience is powered by the Unified Audit pipeline, we no longer support Trimming as a feature. You will be able to access files that have been trimmed so far in the document library that you have set for this purpose.

    We no longer support choosing specific events to edit. Audit Log Reports will still be available as usual but powered by the Unified Audit Pipeline. Please refer to this document for complete list of audited events. Please note that we do not support list items as of now.”

    1. First, the unified audit log has always been available in the compliance portal (including all the previous iterations of the portal).
      Second, audit log trimming is, I believe, a SharePoint on-premises feature that doesn’t apply within Office 365 because SharePoint pushes events to the unified audit log as they happen (every 15 minutes).
      Third, I just ran the script and it works perfectly.

  2. I may be missing something, but the powershell script is not returning anything. Where in the script do I point it to connect to my SPO site?

  3. Hello, I have the same result, when I run audits for deletion files does not bring any information, if I run audits for example for file access if it shows information

    1. Looks like SharePoint Online changed the operation noted for file deleted events from FileDeleted to FileRecycled sometime around last June. I have updated the script in GitHub. Try that and see if the new script works.

      1. Hi, thank you for your reply, still not finding results from deleted items. How you could adapt the script to search a specific SharePoint site

      2. I don’t quite know why you’re not finding audit events for item deletions. I deleted a bunch of OneDrive and SPO files this morning and the report found all 75 audit events. Are you sure you downloaded and used the latest version of the script from GitHub (some more updates this morning to fix formatting of OneDrive deletions for Teams meeting recordings).

        As to filtering, either introduce a check for the specific site in the script or apply a filter against the PowerShell list in the $Report variable. Remember, this is all PowerShell, so it’s in your hands to make the code do what you want.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.