Diagnostics & Tools: Reduce MTTR by 30–40%, prevent $50K–$500K+ incidents

Forensic investigation guides for message trace, Azure AD sign‑in logs, and health checks. 3–10 minute analysis accelerates incident resolution and provides audit-ready documentation.

Essential for P1/P2 incident investigation, Microsoft support escalation, and compliance audits. Message trace identifies mail routing failures and transport rule actions. Sign-in logs decode authentication failures and CA denials. Health checks prevent incidents before user impact. Required for SOC 2/ISO 27001 audit evidence and security incident reports.

Diagnostic Guides

Azure AD Sign-In Logs

Authentication debugging via sign‑in logs.

Diagnose MFA and Conditional Access blocks.

Exchange Health Check

Exchange Online health validation.

Service health, connectors, sync, config checks.

Use Cases

When to use each tool.

  • Message Trace: Mail flow issues, NDRs, delayed delivery, routing diagnostics
  • Sign-In Logs: Authentication failures, Outlook errors, MFA loops, Conditional Access blocks
  • Health Check: Preventive monitoring, configuration validation, post-change verification

When to Use This Section

Use these diagnostic guides to gather evidence before escalating incidents to Microsoft support or when performing root cause analysis. Message trace identifies where emails are queued, dropped, or misrouted in the transport pipeline. Azure AD sign-in logs reveal authentication failures, conditional access policy decisions, and MFA challenge outcomes. Exchange health checks validate service component status, tenant limits, and throttling policies. These tools provide the forensic data needed for P1/P2 incident responses and compliance audits.

Quick Links

Common troubleshooting scenarios.