{"id":56441,"date":"2021-04-14T06:00:21","date_gmt":"2021-04-14T13:00:21","guid":{"rendered":""},"modified":"2022-04-11T16:30:14","modified_gmt":"2022-04-11T23:30:14","slug":"addressing-audit-log-storage-for-u-s-federal-government-customers","status":"publish","type":"post","link":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2021\/04\/14\/addressing-audit-log-storage-for-u-s-federal-government-customers\/","title":{"rendered":"Addressing Audit Log Storage for U.S. Federal Government Customers"},"content":{"rendered":"<p><img decoding=\"async\" class=\"col-xs-12 col-sm-6\" style=\"float: right;padding-left: 0px!important;padding-right: 0px!important;margin-bottom: 15px;margin-left: 15px\" src=\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/28\/2021\/04\/REFLEC_1-scaled.jpg\" alt=\"Reflecting Pool on the National Mall with the Washinton Monument.\" width=\"100%\" \/>At Microsoft, we offer a rich set of robust security and compliance capabilities in Office 365 and Microsoft 365. One of these is the ability to better understand account activity \u2013 like documents accessed, and mailboxes accessed \u2013 through <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/search-the-audit-log-in-security-and-compliance?view=o365-worldwide#file-and-page-activities\">audit logs<\/a> to assess if, how, when, and to what extent a security incident has occurred. To be clear, audit logs don\u2019t prevent attacks, but can be useful in retroactively examining how they occurred when an attacker is impersonating a user.<\/p>\n<p>Different customers have different preferences and needs for where they save their audit logs and how long they wish to keep them. For this reason, we\u2019ve typically provided customers maximum choice and flexibility. By default, we retain audit logs in the cloud for most Office 365\/Microsoft 365 customers for 90 days. This gives customers the ability to decide if they\u2019d like to:<\/p>\n<ul>\n<li>Download the audit logs and store them locally or in a cloud instance of their choice,<\/li>\n<li>Keep them with a third-party security vendor, or<\/li>\n<li>Keep them with Microsoft through an advanced service we call Advanced Audit, which provides deeper forensic investigation tools and audit log storage in the cloud for one year or longer.<\/li>\n<\/ul>\n<p>We appreciate that some U.S. federal government customers have recently raised questions about the costs associated with Advanced Audit and their ability to store audit logs with Microsoft for a longer time period. While we work to address their questions and work collaboratively toward a long-term solution, we are now offering all U.S. federal government customers who use our Government Cloud a one-year free trial of Advanced Audit. Those who are interested should reach out to their Microsoft representative to learn more.<\/p>\n<p>We always invite feedback from customers including our public sector customers and work hard to address it. While we might not be able to immediately meet every need or request, we believe it\u2019s important to listen and to continuously invest in making helpful improvements. We have recently, for example, offered new <a href=\"https:\/\/blogs.microsoft.com\/eupolicy\/2019\/07\/02\/how-microsoft-works-with-customers-to-keep-their-trust-a-story-from-the-netherlands\/\">privacy tools<\/a> in response to feedback from the Dutch Ministry of Justice and Security, and before the 2020 election, we extended free <a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2019\/09\/20\/extending-free-windows-7-security-updates-to-voting-systems\/\">security updates<\/a> to voting machines running Windows 7.<\/p>\n<p>Throughout our 45-year history,\u00a0we have\u00a0supported\u00a0the U.S. federal government to\u00a0help them use the power of\u00a0technology\u00a0to advance the mission of\u00a0its agencies. We hope today\u2019s update is another example of our commitment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>At Microsoft, we offer a rich set of robust security and compliance capabilities in Office 365 and Microsoft 365. One of these is the ability to better understand account activity \u2013 like documents accessed, and mailboxes accessed \u2013 through audit logs to assess if, how, when, and to what extent a security incident has occurred. To be clear, audit logs don\u2019t prevent attacks, but can be useful in retroactively examining how they occurred when an attacker is impersonating a user.<\/p>\n","protected":false},"author":438,"featured_media":56444,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","footnotes":""},"categories":[1542],"post_tag":[75,1674,1590,127,1644,148],"content-type":[261],"coauthors":[1316],"class_list":["post-56441","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-cybersecurity","tag-government","tag-microsoft-365","tag-office-365","tag-privacy","tag-security","content-type-best-practices"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Addressing Audit Log Storage for U.S. Federal Government Customers - Microsoft in Business Blogs<\/title>\n<meta name=\"description\" content=\"At Microsoft, we offer a rich set of robust security and compliance capabilities in Office 365 and Microsoft 365. One of these is the ability to better understand account activity \u2013 like documents accessed, and mailboxes accessed \u2013 through audit logs to assess if, how, when, and to what extent a security incident has occurred. To be clear, audit logs don\u2019t prevent attacks, but can be useful in retroactively examining how they occurred when an attacker is impersonating a user.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2021\/04\/14\/addressing-audit-log-storage-for-u-s-federal-government-customers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Addressing Audit Log Storage for U.S. Federal Government Customers - Microsoft in Business Blogs\" \/>\n<meta property=\"og:description\" content=\"At Microsoft, we offer a rich set of robust security and compliance capabilities in Office 365 and Microsoft 365. One of these is the ability to better understand account activity \u2013 like documents accessed, and mailboxes accessed \u2013 through audit logs to assess if, how, when, and to what extent a security incident has occurred. To be clear, audit logs don\u2019t prevent attacks, but can be useful in retroactively examining how they occurred when an attacker is impersonating a user.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2021\/04\/14\/addressing-audit-log-storage-for-u-s-federal-government-customers\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft in Business Blogs\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-14T13:00:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-11T23:30:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2021\/04\/REFLEC_1-1024x683.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Rick Wagner\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rick Wagner\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 min read\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2021\/04\/14\/addressing-audit-log-storage-for-u-s-federal-government-customers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2021\/04\/14\/addressing-audit-log-storage-for-u-s-federal-government-customers\/\"},\"author\":[{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/author\/rick-wagner\/\",\"@type\":\"Person\",\"@name\":\"Rick Wagner\"}],\"headline\":\"Addressing Audit Log Storage for U.S. Federal Government Customers\",\"datePublished\":\"2021-04-14T13:00:21+00:00\",\"dateModified\":\"2022-04-11T23:30:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2021\/04\/14\/addressing-audit-log-storage-for-u-s-federal-government-customers\/\"},\"wordCount\":405,\"publisher\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/#organization\"},\"image\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2021\/04\/14\/addressing-audit-log-storage-for-u-s-federal-government-customers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2021\/04\/REFLEC_1-scaled.jpg\",\"keywords\":[\"Cybersecurity\",\"Government\",\"Microsoft 365\",\"Office 365\",\"Privacy\",\"Security\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2021\/04\/14\/addressing-audit-log-storage-for-u-s-federal-government-customers\/\",\"url\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2021\/04\/14\/addressing-audit-log-storage-for-u-s-federal-government-customers\/\",\"name\":\"Addressing Audit Log Storage for U.S. Federal Government Customers - Microsoft in Business Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2021\/04\/14\/addressing-audit-log-storage-for-u-s-federal-government-customers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2021\/04\/14\/addressing-audit-log-storage-for-u-s-federal-government-customers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2021\/04\/REFLEC_1-scaled.jpg\",\"datePublished\":\"2021-04-14T13:00:21+00:00\",\"dateModified\":\"2022-04-11T23:30:14+00:00\",\"description\":\"At Microsoft, we offer a rich set of robust security and compliance capabilities in Office 365 and Microsoft 365. One of these is the ability to better understand account activity \u2013 like documents accessed, and mailboxes accessed \u2013 through audit logs to assess if, how, when, and to what extent a security incident has occurred. To be clear, audit logs don\u2019t prevent attacks, but can be useful in retroactively examining how they occurred when an attacker is impersonating a user.\",\"breadcrumb\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2021\/04\/14\/addressing-audit-log-storage-for-u-s-federal-government-customers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2021\/04\/14\/addressing-audit-log-storage-for-u-s-federal-government-customers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2021\/04\/14\/addressing-audit-log-storage-for-u-s-federal-government-customers\/#primaryimage\",\"url\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2021\/04\/REFLEC_1-scaled.jpg\",\"contentUrl\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2021\/04\/REFLEC_1-scaled.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"Reflecting Pool on the National Mall with the Washinton Monument reflected. The National Mall is an open-area national park in downtown Washington, D.C., the capital of the United States. The National Mall is a unit of the National Park Service, and is administered by the National Mall and Memorial Parks unit.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2021\/04\/14\/addressing-audit-log-storage-for-u-s-federal-government-customers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Addressing Audit Log Storage for U.S. Federal Government Customers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/#website\",\"url\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/\",\"name\":\"Microsoft in Business Blogs\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/#organization\",\"name\":\"Microsoft in Business Blogs\",\"url\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2018\/07\/R6wl9gWl_400x400.jpg\",\"contentUrl\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2018\/07\/R6wl9gWl_400x400.jpg\",\"width\":400,\"height\":400,\"caption\":\"Microsoft in Business Blogs\"},\"image\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Addressing Audit Log Storage for U.S. Federal Government Customers - Microsoft in Business Blogs","description":"At Microsoft, we offer a rich set of robust security and compliance capabilities in Office 365 and Microsoft 365. One of these is the ability to better understand account activity \u2013 like documents accessed, and mailboxes accessed \u2013 through audit logs to assess if, how, when, and to what extent a security incident has occurred. To be clear, audit logs don\u2019t prevent attacks, but can be useful in retroactively examining how they occurred when an attacker is impersonating a user.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2021\/04\/14\/addressing-audit-log-storage-for-u-s-federal-government-customers\/","og_locale":"en_US","og_type":"article","og_title":"Addressing Audit Log Storage for U.S. Federal Government Customers - Microsoft in Business Blogs","og_description":"At Microsoft, we offer a rich set of robust security and compliance capabilities in Office 365 and Microsoft 365. One of these is the ability to better understand account activity \u2013 like documents accessed, and mailboxes accessed \u2013 through audit logs to assess if, how, when, and to what extent a security incident has occurred. To be clear, audit logs don\u2019t prevent attacks, but can be useful in retroactively examining how they occurred when an attacker is impersonating a user.","og_url":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2021\/04\/14\/addressing-audit-log-storage-for-u-s-federal-government-customers\/","og_site_name":"Microsoft in Business Blogs","article_published_time":"2021-04-14T13:00:21+00:00","article_modified_time":"2022-04-11T23:30:14+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2021\/04\/REFLEC_1-1024x683.jpg","type":"image\/jpeg"}],"author":"Rick Wagner","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Rick Wagner","Est. reading time":"2 min read"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2021\/04\/14\/addressing-audit-log-storage-for-u-s-federal-government-customers\/#article","isPartOf":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2021\/04\/14\/addressing-audit-log-storage-for-u-s-federal-government-customers\/"},"author":[{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/author\/rick-wagner\/","@type":"Person","@name":"Rick Wagner"}],"headline":"Addressing Audit Log Storage for U.S. Federal Government Customers","datePublished":"2021-04-14T13:00:21+00:00","dateModified":"2022-04-11T23:30:14+00:00","mainEntityOfPage":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2021\/04\/14\/addressing-audit-log-storage-for-u-s-federal-government-customers\/"},"wordCount":405,"publisher":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/#organization"},"image":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2021\/04\/14\/addressing-audit-log-storage-for-u-s-federal-government-customers\/#primaryimage"},"thumbnailUrl":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2021\/04\/REFLEC_1-scaled.jpg","keywords":["Cybersecurity","Government","Microsoft 365","Office 365","Privacy","Security"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2021\/04\/14\/addressing-audit-log-storage-for-u-s-federal-government-customers\/","url":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2021\/04\/14\/addressing-audit-log-storage-for-u-s-federal-government-customers\/","name":"Addressing Audit Log Storage for U.S. Federal Government Customers - Microsoft in Business Blogs","isPartOf":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/#website"},"primaryImageOfPage":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2021\/04\/14\/addressing-audit-log-storage-for-u-s-federal-government-customers\/#primaryimage"},"image":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2021\/04\/14\/addressing-audit-log-storage-for-u-s-federal-government-customers\/#primaryimage"},"thumbnailUrl":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2021\/04\/REFLEC_1-scaled.jpg","datePublished":"2021-04-14T13:00:21+00:00","dateModified":"2022-04-11T23:30:14+00:00","description":"At Microsoft, we offer a rich set of robust security and compliance capabilities in Office 365 and Microsoft 365. One of these is the ability to better understand account activity \u2013 like documents accessed, and mailboxes accessed \u2013 through audit logs to assess if, how, when, and to what extent a security incident has occurred. To be clear, audit logs don\u2019t prevent attacks, but can be useful in retroactively examining how they occurred when an attacker is impersonating a user.","breadcrumb":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2021\/04\/14\/addressing-audit-log-storage-for-u-s-federal-government-customers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2021\/04\/14\/addressing-audit-log-storage-for-u-s-federal-government-customers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2021\/04\/14\/addressing-audit-log-storage-for-u-s-federal-government-customers\/#primaryimage","url":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2021\/04\/REFLEC_1-scaled.jpg","contentUrl":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2021\/04\/REFLEC_1-scaled.jpg","width":2560,"height":1707,"caption":"Reflecting Pool on the National Mall with the Washinton Monument reflected. The National Mall is an open-area national park in downtown Washington, D.C., the capital of the United States. The National Mall is a unit of the National Park Service, and is administered by the National Mall and Memorial Parks unit."},{"@type":"BreadcrumbList","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2021\/04\/14\/addressing-audit-log-storage-for-u-s-federal-government-customers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/"},{"@type":"ListItem","position":2,"name":"Addressing Audit Log Storage for U.S. Federal Government Customers"}]},{"@type":"WebSite","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/#website","url":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/","name":"Microsoft in Business Blogs","description":"","publisher":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/#organization","name":"Microsoft in Business Blogs","url":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/#\/schema\/logo\/image\/","url":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2018\/07\/R6wl9gWl_400x400.jpg","contentUrl":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2018\/07\/R6wl9gWl_400x400.jpg","width":400,"height":400,"caption":"Microsoft in Business Blogs"},"image":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/#\/schema\/logo\/image\/"}}]}},"msxcm_animated_featured_image":null,"_links":{"self":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/posts\/56441","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/users\/438"}],"replies":[{"embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/comments?post=56441"}],"version-history":[{"count":0,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/posts\/56441\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/media\/56444"}],"wp:attachment":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/media?parent=56441"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/categories?post=56441"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/post_tag?post=56441"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/content-type?post=56441"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/coauthors?post=56441"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}