
Security News
/Research
Popular node-ipc npm Package Infected with Credential Stealer
Socket detected malicious node-ipc versions with obfuscated stealer/backdoor behavior in a developing npm supply chain attack.
purviewer
Advanced tools
A powerful command-line tool for analyzing Microsoft Purview audit logs and Entra sign-ins. Extract insights from SharePoint, OneDrive, Exchange activity, and user authentication with comprehensive filtering, security analysis, and detailed reporting.
--actions ACTIONS specific actions to analyze, comma-separated
--list-files KEYWORD list filenames containing keyword
--list-actions-for-files KEYWORD list actions performed on files by keyword
--user USERNAME filter actions by specific user
--user-map USER_MAP_CSV optional M365 user export CSV (UPN, display name)
--start-date START_DATE start date for analysis (YYYY-MM-DD)
--end-date END_DATE end date for analysis (YYYY-MM-DD)
--sort-by {filename,username,date} sort results by filename, username, or date (default: date)
--details show detailed file lists in operation summaries
--ips IPS filter by individual IPs (comma-separated, supports wildcards)
--exclude-ips IPS exclude specific IPs (comma-separated, supports wildcards)
--do-ip-lookups perform IP geolocation lookups (takes a few seconds per IP)
--timeline print a full timeline of file access events
--full-urls print full URLs of accessed files
--exchange output only Exchange activity in table format
--export-exchange-csv OUTPUT_FILE export Exchange activity to specified CSV file
--entra analyze sign-in data from an Entra ID CSV audit log
--filter FILTER_TEXT filter sign-ins by specified text (case-insensitive)
--exclude EXCLUDE_TEXT exclude sign-ins with specified text (case-insensitive)
--limit MAX_ROWS limit rows shown for each sign-in column
# Analyze all file operations from a Purview audit log
purviewer audit_log.csv
# Analyze Entra ID sign-in data
purviewer signin_data.csv --entra
# Look for suspicious bulk downloads
purviewer audit_log.csv --actions "FileDownloaded" --details
# Analyze IP addresses with geolocation
purviewer audit_log.csv --do-ip-lookups
# Check specific user's activity
purviewer audit_log.csv --user "john.doe@company.com" --timeline
# Find files containing sensitive keywords
purviewer audit_log.csv --list-actions-for-files "confidential"
# Export all accessed file URLs
purviewer audit_log.csv --full-urls
# Focus on email activity only
purviewer audit_log.csv --exchange
# Export Exchange data for further analysis
purviewer audit_log.csv --export-exchange-csv email_activity.csv
# Filter sign-ins by specific criteria
purviewer signin_data.csv --entra --filter "admin" --exclude "success"
pip install purviewer
Important Note: The sign-in analysis feature uses a different data source than the main Purview analysis. While most features analyze data from Microsoft Purview audit logs (SharePoint, OneDrive, Exchange), the --entra feature specifically requires a CSV export from Microsoft Entra ID's sign-in logs. These are two separate data sources with different formats and column structures.
The tool automatically detects SharePoint domains and email domains from your audit data, making it work seamlessly with any Microsoft 365 tenant.
Purviewer is released under the MIT License. See the LICENSE file for details.
FAQs
Audit log analyzer for Microsoft Purview
We found that purviewer demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
/Research
Socket detected malicious node-ipc versions with obfuscated stealer/backdoor behavior in a developing npm supply chain attack.

Security News
TeamPCP and BreachForums are promoting a Shai-Hulud supply chain attack contest with a $1,000 prize for the biggest package compromise.

Security News
Packagist urges PHP projects to update Composer after a GitHub token format change exposed some GitHub Actions tokens in CI logs.