You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/concept-diagnostic-settings-logs-options.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,5 @@
1
1
---
2
-
3
-
title: Logs available for streaming to endpoints from Microsoft Entra ID
2
+
title: Logs available for streaming from Microsoft Entra ID
4
3
description: Learn about the Microsoft Entra logs available for streaming to an endpoint for storage, analysis, or monitoring.
5
4
services: active-directory
6
5
author: shlipsey3
@@ -11,21 +10,22 @@ ms.workload: identity
11
10
ms.subservice: report-monitor
12
11
ms.date: 09/28/2023
13
12
ms.author: sarahlipsey
14
-
ms.reviewer: besiler
13
+
ms.reviewer: egreenberg14
15
14
15
+
# Customer Intent: As an IT admin, I want to know what logs are available for streaming to an endpoint from Microsoft Entra ID so that I can choose the best option for my organization.
16
16
---
17
17
18
-
# Learn about the identity logs you can stream to an endpoint
18
+
# What are the identity logs you can stream to an endpoint?
19
19
20
-
Using Diagnostic settings in Microsoft Entra ID, you can route activity logs to several endpoints for long term retention and data insights. You select the logs you want to route, then select the endpoint.
20
+
Using Microsoft Entra diagnostic settings, you can route activity logs to several endpoints for long term retention and data insights. You select the logs you want to route, then select the endpoint.
21
21
22
-
This article describes the logs that you can route to an endpoint from Microsoft Entra Diagnostic settings.
22
+
This article describes the logs that you can route to an endpoint with Microsoft Entra diagnostic settings.
23
23
24
-
## Prerequisites
24
+
## Log streaming requirements and options
25
25
26
-
Setting up an endpoint, such as an event hub or storage account, may require different roles and licenses. To create or edit a new Diagnostic setting, you need a user who's a **Security Administrator** or **Global Administrator** for the Microsoft Entra tenant.
26
+
Setting up an endpoint, such as an event hub or storage account, may require different roles and licenses. To create or edit a new diagnostic setting, you need a user who's a **Security Administrator** or **Global Administrator** for the Microsoft Entra tenant.
27
27
28
-
To help decide which log routing option is best for you, see [How to access activity logs](howto-access-activity-logs.md). The overall process and requirements for each endpoint type are covered in the following articles.
28
+
To help decide which log routing option is best for you, see [How to access activity logs](howto-access-activity-logs.md). The overall process and requirements for each endpoint type are covered in the following articles:
29
29
30
30
-[Send logs to a Log Analytics workspace to integrate with Azure Monitor logs](howto-integrate-activity-logs-with-azure-monitor-logs.md)
31
31
-[Archive logs to a storage account](howto-archive-logs-to-storage-account.md)
@@ -34,7 +34,7 @@ To help decide which log routing option is best for you, see [How to access acti
34
34
35
35
## Activity log options
36
36
37
-
The following logs can be sent to an endpoint. Some logs may be in public preview but still visible in the portal.
37
+
The following logs can be routed to an endpoint for storage, analysis, or monitoring.
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/concept-sign-ins.md
+12-6Lines changed: 12 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,9 +8,9 @@ ms.service: active-directory
8
8
ms.topic: conceptual
9
9
ms.workload: identity
10
10
ms.subservice: report-monitor
11
-
ms.date: 08/31/2023
11
+
ms.date: 09/26/2023
12
12
ms.author: sarahlipsey
13
-
ms.reviewer: besiler
13
+
ms.reviewer: egreenberg14
14
14
---
15
15
# What are Microsoft Entra sign-in logs?
16
16
@@ -73,17 +73,23 @@ In addition to the default fields, the interactive sign-in log also shows:
73
73
74
74
**Non-interactive sign-ins on the interactive sign-in logs**
75
75
76
-
Previously, some non-interactive sign-ins from Microsoft Exchange clients were included in the interactive user sign-in log for better visibility. This increased visibility was necessary before the non-interactive user sign-in logs were introduced in November 2020. However, it's important to note that some non-interactive sign-ins, such as those using FIDO2 keys, may still be marked as interactive due to the way the system was set up before the separate non-interactive logs were introduced. These sign-ins may display interactive details like client credential type and browser information, even though they are technically non-interactive sign-ins.
76
+
Previously, some non-interactive sign-ins from Microsoft Exchange clients were included in the interactive user sign-in log for better visibility. This increased visibility was necessary before the non-interactive user sign-in logs were introduced in November 2020. However, it's important to note that some non-interactive sign-ins, such as those using FIDO2 keys, may still be marked as interactive due to the way the system was set up before the separate non-interactive logs were introduced. These sign-ins may display interactive details like client credential type and browser information, even though they're technically non-interactive sign-ins.
77
77
78
78
**Passthrough sign-ins**
79
79
80
-
Microsoft Entra ID issues tokens for authentication and authorization. In some situations, a user who is signed in to the Contoso tenant may try to access resources in the Fabrikam tenant, where they don't have access. A no-authorization token, called a passthrough token, is issued to the Fabrikam tenant. The passthrough token doesn't allow the user to access any resources.
80
+
Microsoft Entra ID issues tokens for authentication and authorization. In some situations, a user who is signed in to the Contoso tenant may try to access resources in the Fabrikam tenant, where they don't have access. A no-authorization token called a passthrough token, is issued to the Fabrikam tenant. The passthrough token doesn't allow the user to access any resources.
81
81
82
82
When reviewing the logs for this situation, the sign-in logs for the home tenant (in this scenario, Contoso) don't show a sign-in attempt because the token wasn't evaluated against the home tenant's policies. The sign-in token was only used to display the appropriate failure message. You won't see a sign-in attempt in the logs for the home tenant.
83
83
84
+
**First-party, app-only service principal sign-ins**
85
+
86
+
The service principal sign-in logs don't include first-party, app-only sign-in activity. This type of activity happens when first-party apps get tokens for an internal Microsoft job where there's no direction or context from a user. We exclude these logs so you're not paying for logs related to internal Microsoft tokens within your tenant.
87
+
88
+
You may identify Microsoft Graph events that don't correlate to a service principal sign-in if you're routing `MicrosoftGraphActivityLogs` with `SignInLogs` to the same Log Analytics workspace. This integration allows you to cross reference the token issued by the Microsoft Graph activity with the sign-in. The `UniqueTokenIdentifier` in the Microsoft Graph activity logs would be missing from the service principal sign-in logs.
89
+
84
90
### Non-interactive user sign-ins
85
91
86
-
Non-interactive sign-ins are done *on behalf of a* user. These sign-ins were performed by a client app or OS components on behalf of a user and don't require the user to provide an authentication factor. Instead, Microsoft Entra ID recognizes when the user's token needs to be refreshed and does so behind the scenes, without interrupting the user's session. In general, the user perceives these sign-ins as happening in the background.
92
+
Non-interactive sign-ins are done *on behalf of a* user. These delegated sign-ins were performed by a client app or OS components on behalf of a user and don't require the user to provide an authentication factor. Instead, Microsoft Entra ID recognizes when the user's token needs to be refreshed and does so behind the scenes, without interrupting the user's session. In general, the user perceives these sign-ins as happening in the background.
87
93
88
94

89
95
@@ -106,7 +112,7 @@ To make it easier to digest the data, non-interactive sign-in events are grouped
106
112
107
113
:::image type="content" source="media/concept-sign-ins/aggregate-sign-in.png" alt-text="Screenshot of an aggregate sign-in expanded to show all rows." lightbox="media/concept-sign-ins/aggregate-sign-in-expanded.png":::
108
114
109
-
When Microsoft Entra ID logs multiple sign-ins that are identical other than time and date, those sign-ins are from the same entity and are aggregated into a single row. A row with multiple identical sign-ins (except for date and time issued) has a value greater than 1 in the *# sign-ins* column. These aggregated sign-ins may also appear to have the same time stamps. The **Time aggregate** filter can set to 1 hour, 6 hours, or 24 hours. You can expand the row to see all the different sign-ins and their different time stamps.
115
+
When Microsoft Entra ID logs multiple sign-ins that are identical other than time and date, those sign-ins are from the same entity and are aggregated into a single row. A row with multiple identical sign-ins (except for date and time issued) has a value greater than one in the *# sign-ins* column. These aggregated sign-ins may also appear to have the same time stamps. The **Time aggregate** filter can set to 1 hour, 6 hours, or 24 hours. You can expand the row to see all the different sign-ins and their different time stamps.
110
116
111
117
Sign-ins are aggregated in the non-interactive users when the following data matches:
0 commit comments