Skip to content

Commit 0e919f6

Browse files
committed
update-ownership-tutorials
1 parent 943466b commit 0e919f6

File tree

3 files changed

+20
-29
lines changed

3 files changed

+20
-29
lines changed

articles/active-directory/reports-monitoring/tutorial-access-api-with-certificates.md

Lines changed: 10 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -2,23 +2,20 @@
22
title: Tutorial for AD Reporting API with certificates | Microsoft Docs
33
description: This tutorial explains how to use the Azure AD Reporting API with certificate credentials to get data from directories without user intervention.
44
services: active-directory
5-
documentationcenter: ''
6-
author: MarkusVi
5+
author: shlipsey3
76
manager: amycolannino
8-
9-
ms.assetid:
107
ms.service: active-directory
118
ms.workload: identity
12-
ms.tgt_pltfrm: na
139
ms.topic: tutorial
1410
ms.subservice: report-monitor
15-
ms.date: 08/26/2022
16-
ms.author: markvi
11+
ms.date: 10/31/2022
12+
ms.author: sarahlipsey
1713
ms.reviewer: dhanyahk
18-
19-
# Customer intent: As a developer, I want to learn how to access the Azure AD reporting API using certificates so that I can create an application that does not require user intervention to access reports.
2014
ms.collection: M365-identity-device-management
2115
ms.custom: has-adal-ref
16+
17+
# Customer intent: As a developer, I want to learn how to access the Azure AD reporting API using certificates so that I can create an application that does not require user intervention to access reports.
18+
2219
---
2320

2421
# Tutorial: Get data using the Azure Active Directory reporting API with certificates
@@ -29,9 +26,9 @@ In this tutorial, you learn how to use a test certificate to access the MS Graph
2926

3027
## Prerequisites
3128

32-
1. To access sign-in data, make sure you have an Azure Active Directory tenant with a premium (P1/P2) license. See [Getting started with Azure Active Directory Premium](../fundamentals/active-directory-get-started-premium.md) to upgrade your Azure Active Directory edition. Note that if you did not have any activities data prior to the upgrade, it will take a couple of days for the data to show up in the reports after you upgrade to a premium license.
29+
1. To access sign-in data, make sure you have an Azure AD tenant with a premium (P1/P2) license. See [Getting started with Azure Active Directory Premium](../fundamentals/active-directory-get-started-premium.md) to upgrade your Azure AD edition. Note that if you did not have any activities data prior to the upgrade, it will take a couple of days for the data to show up in the reports after you upgrade to a premium license.
3330

34-
2. Create or switch to a user account in the **global administrator**, **security administrator**, **security reader** or **report reader** role for the tenant.
31+
2. Create or switch to a user account in the **Global Administrator**, **Security Administrator**, **Security Reader** or **Report Reader** role for the tenant.
3532

3633
3. Complete the [prerequisites to access the Azure Active Directory reporting API](howto-configure-prerequisites-for-reporting-api.md).
3734

@@ -60,9 +57,9 @@ In this tutorial, you learn how to use a test certificate to access the MS Graph
6057

6158
## Get data using the Azure Active Directory reporting API with certificates
6259

63-
1. Navigate to the [Azure portal](https://portal.azure.com), select **Azure Active Directory**, then select **App registrations** and choose your application from the list.
60+
1. Go to the [Azure portal](https://portal.azure.com) > **Azure Active Directory** > **App registrations** and choose your application from the list.
6461

65-
2. Select **Certificates & secrets** under **Manage** section on Application registration blade and select **Upload Certificate**.
62+
2. Select **Certificates & secrets** under the **Manage** section on Application registration blade and select **Upload Certificate**.
6663

6764
3. Select the certificate file from the previous step and select **Add**.
6865

articles/active-directory/reports-monitoring/tutorial-azure-monitor-stream-logs-to-event-hub.md

Lines changed: 5 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -2,23 +2,18 @@
22
title: Tutorial - Stream logs to an Azure event hub | Microsoft Docs
33
description: Learn how to set up Azure Diagnostics to push Azure Active Directory logs to an event hub
44
services: active-directory
5-
documentationcenter: ''
6-
author: MarkusVi
5+
author: shlipsey3
76
manager: amycolannino
8-
editor: ''
9-
10-
ms.assetid: 045f94b3-6f12-407a-8e9c-ed13ae7b43a3
117
ms.service: active-directory
128
ms.topic: tutorial
13-
ms.tgt_pltfrm: na
149
ms.workload: identity
1510
ms.subservice: report-monitor
16-
ms.date: 08/26/2022
17-
ms.author: markvi
11+
ms.date: 10/31/2022
12+
ms.author: sarahlipsey
1813
ms.reviewer: besiler
14+
ms.collection: M365-identity-device-management
1915

2016
# Customer intent: As an IT administrator, I want to learn how to route Azure AD logs to an event hub so I can integrate it with my third party SIEM system.
21-
ms.collection: M365-identity-device-management
2217
---
2318
# Tutorial: Stream Azure Active Directory logs to an Azure event hub
2419

@@ -30,7 +25,7 @@ To use this feature, you need:
3025

3126
* An Azure subscription. If you don't have an Azure subscription, you can [sign up for a free trial](https://azure.microsoft.com/free/).
3227
* An Azure AD tenant.
33-
* A user who's a *global administrator* or *security administrator* for the Azure AD tenant.
28+
* A user who's a *Global Administrator* or *Security Administrator* for the Azure AD tenant.
3429
* An Event Hubs namespace and an event hub in your Azure subscription. Learn how to [create an event hub](../../event-hubs/event-hubs-create.md).
3530

3631
## Stream logs to an event hub
@@ -95,6 +90,5 @@ After data is displayed in the event hub, you can access and read the data in tw
9590
* [Integrate Azure Active Directory logs with ArcSight using Azure Monitor](howto-integrate-activity-logs-with-arcsight.md)
9691
* [Integrate Azure AD logs with Splunk by using Azure Monitor](./howto-integrate-activity-logs-with-splunk.md)
9792
* [Integrate Azure AD logs with SumoLogic by using Azure Monitor](howto-integrate-activity-logs-with-sumologic.md)
98-
* [Integrate Azure AD logs with Elastic using an event hub](https://github.com/Microsoft/azure-docs/blob/master/articles/active-directory/reports-monitoring/tutorial-azure-monitor-stream-logs-to-event-hub.md)
9993
* [Interpret audit logs schema in Azure Monitor](./overview-reports.md)
10094
* [Interpret sign-in logs schema in Azure Monitor](reference-azure-monitor-sign-ins-log-schema.md)

articles/active-directory/reports-monitoring/tutorial-log-analytics-wizard.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,10 +6,10 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: report-monitor
88
ms.topic: tutorial
9-
ms.date: 08/26/2022
9+
ms.date: 10/31/2022
1010

11-
ms.author: markvi
12-
author: MarkusVi
11+
ms.author: shlipsey3
12+
author: srahlipsey
1313
manager: amycolannino
1414
ms.reviewer: sandeo
1515

@@ -33,9 +33,9 @@ In this tutorial, you learn how to:
3333

3434
- An Azure subscription with at least one P1 licensed admin. If you don't have an Azure subscription, you can [sign up for a free trial](https://azure.microsoft.com/free/).
3535

36-
- An Azure AD tenant.
36+
- An Azure Active Directory (Azure AD) tenant.
3737

38-
- A user who's a global administrator or security administrator for the Azure AD tenant.
38+
- A user who's a Global Administrator or Security Administrator for the Azure AD tenant.
3939

4040

4141
Familiarize yourself with these articles:

0 commit comments

Comments
 (0)