// per-tool methodology
microsoft 365 unified audit log analyzer
drop m365 unified audit log csv or json export · parse all audit events across exchange sharepoint teams onedrive and azure ad · surface suspicious operations privilege changes and data access events · reconstruct user activity timeline · runs locally
public grade
A
flagship triageraw 14/14 · raw 12–14 / 14
Awhat this grade means
real parser depth · 2+ exports with reason fields · honest limits · canonical UI shell
capability class · export / document parser
structured exports — JSON, CSV, EML, ZIP, HTML — parsed against the file format spec
max grade for this class: A
- parser fidelity depends on export format version and vendor schema drift
- malformed or truncated exports may skip records silently — check the system log
known limitations
- even A-grade tools can be wrong on rare inputs, malformed files, or adversarial samples
- independent verification is required before consequential or evidentiary use
- the grade is not a court-admissibility score — jurisdiction and chain of custody still apply
B minimum ship bar
- newly added forensics tools must clear the public B minimum before merging
- minimum: letter grade B or A · raw score ≥ 9/14 · UI dimension = 2 · IF/OU/DQ/RB/HN ≥ 1 each · no critical red flags (missing engine, placeholder logic, no exports)
- the ship bar is enforced by quality.audit.json sidecars and npm run tools:grade-forensics --check