Security News > 2021 > September > How to see who is trying to break into your Office 365 and what they're trying to hack
While most of Azure Active Directory's security features require an enterprise Microsoft 365 account, an E3 or better, you can still get some benefit from Azure Active Directory from an Office 365 account.
It's worth using these tools to see what exposure you have to drive-by attacks, where techniques like password dictionary sprays are used to break into poorly secured accounts.
Users can get a good picture of their exposure from their Microsoft 365 or Office 365 account page.
You'll see a lot of security tooling built into the Office 365 My Account page; it's here you manage passwords and devices, as well as your privacy settings.
It's a useful tool, as it shows where someone attempted to log-in from, what they were trying to connect to and what account they were trying to compromise.
Using this tool with my own account, I could see a few legitimate logins from my browser, from my Office apps and from various Microsoft browser extensions I'd installed.