Office 365 Auditing and Reporting Software

Stealthbits provides comprehensive visibility into Microsoft Office 365 data resources, including SharePoint Online, OneDrive for Business, and Exchange Online.

Request a Free Trial

Powered by ChronoForms -

Office 365 Reporting for SharePoint Online and OneDrive for Business

Auditing & Reporting

  • Understand effective access to Sites, Lists, and Libraries, as well as determine where any user or group has access
  • Identify where direct permissions are applied that may be indicative of high-risk or otherwise toxic conditions
  • Identify instances where resources are being shared explicitly or anonymously


  • Identify site ownership through analysis of permissions, content ownership, and activity


  • Locate content that has not been modified in a defined period of time to identify areas where clean-up efforts can be focused
  • Identify where content sizes may be exceptional due to large documents and version history in order to identify areas where clean-up efforts can be focused

Threat & Vulnerability Detection

  • Identify where the most open sites, lists, and libraries exist within the environment and obtain details on the levels of effective access various High Risk Trustees have

Sensitive Data Discovery

  • Identify files (including images using OCR) containing sensitive content such as Credit Card and Social Security numbers, personal health information, and dozens of other types of Personally Identifiable Information (PII) in multiple languages
  • Create and search for custom criteria specific to an organization such as Employee ID numbers, trade secrets, and product formulas

Data Classification

  • Collect file metadata including classification tags that have been implemented via internal processes or third-party solutions


  • Publish O365 SharePoint Online and OneDrive for Business entitlements to IAM/IGA platforms through open data views

Office 365 Reporting for Exchange Online

Auditing & Reporting

  • Understand effective access to mailboxes, including where delegate/send on behalf of rights have been assigned and effective membership for the default Exchange Administration groups
  • Identify where entitlements are explicitly assigned to the default or anonymous accounts across public folders, as well as places where unresolved SIDs have been given entitlements


  • Identify mailbox users with the largest mailboxes and trash bins, as well as orphaned mailboxes and high-growth mail stores to identify areas for clean-up
  • Locate public folders with aging content by file count and file size as well as the largest public folders and their growth to better target clean-up efforts
  • Identify stale distribution lists (not being used) and group members, which can be removed

Mail-flow Metrics

  • Monitor the features that are enabled for mailboxes, as well as overall mail traffic, user mail flow, and domains sending and receiving mail to the organization


Data Governance in the Cloud

Executive Brief

Learn More

Office 365 Support

Executive Brief

Learn More

StealthAUDIT® for Active Directory

Data Sheet

Learn More

Free Risk Assessment
Free Trial Request
STEALTHbits Demo Request
Browse Resource Library
Free Risk Analysis Stealthbits' Credentials and Data Security Assessment is your Business-Justification-in-a-Box!x