False positive audit marks in SharePoint - what's actually causing them and how do you dig in
Been seeing FileMalwareDetected events pop up in Purview audit logs lately for files that are clearly clean, and, it got me thinking about how many people actually know how to investigate these properly vs just dismissing them. Worth flagging upfront: if you're seeing a spike in these right now, it may not be purely noise. CVE-2026-32201, a SharePoint spoofing vuln that was actively exploited and patched on April 14, was causing improper input validation issues that triggered false audit flags. CISA added it to the KEV catalog, so if you haven't patched yet, that's the first thing to do. Some of what looks like a false positive wave in your logs could be related, to that or to the RCE activity that's been generating audit noise since earlier this year. That said, the usual culprits are still very much a thing. OneDrive sync clients triggering scan activity that looks suspicious, third-party apps accessing content in patterns that, set off the detection engine, and signature-based scanning flagging benign files with embedded macros or unusual compression. All still common. When I dig into these, the first stop is always Purview Audit. Filter for FileMalwareDetected and pull the AuditData field. You'll get VirusVendor, VirusInfo, the file path, and site URL, which is usually enough to figure out whether it's a real hit or noise. VirusVendor showing "Default" means signature-based detection, "Advanced Threat Protection" means Safe Attachments caught it, and those I take more seriously. You can also run Get-SPOMalwareFile in PowerShell if you want to pull this programmatically rather than clicking through the portal. One thing to keep in mind: audit log retention in Purview varies by license, so, confirm your tenant settings before assuming you have the full 180 days to work with. If it does look like a false positive, submit through aka.ms/wdsi so Microsoft can update their detection. Cross-referencing timestamps and IPs in Defender for Cloud Apps also helps figure out whether the access pattern makes sense for a real user vs automated tooling. The thing that frustrates me is that with tool sprawl across multiple DLP policies and third-party scanners, the noise compounds fast, especially during a period like right now