Skip to content

Commit 0ed3a29

Browse files
Merge pull request #252848 from shlipsey3/monitoring-092623
log cross-reference limitations
2 parents fb7a262 + b5a0283 commit 0ed3a29

File tree

3 files changed

+55
-41
lines changed

3 files changed

+55
-41
lines changed

articles/active-directory/reports-monitoring/concept-diagnostic-settings-logs-options.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,5 @@
11
---
2-
3-
title: Logs available for streaming to endpoints from Microsoft Entra ID
2+
title: Logs available for streaming from Microsoft Entra ID
43
description: Learn about the Microsoft Entra logs available for streaming to an endpoint for storage, analysis, or monitoring.
54
services: active-directory
65
author: shlipsey3
@@ -11,21 +10,22 @@ ms.workload: identity
1110
ms.subservice: report-monitor
1211
ms.date: 09/28/2023
1312
ms.author: sarahlipsey
14-
ms.reviewer: besiler
13+
ms.reviewer: egreenberg14
1514

15+
# Customer Intent: As an IT admin, I want to know what logs are available for streaming to an endpoint from Microsoft Entra ID so that I can choose the best option for my organization.
1616
---
1717

18-
# Learn about the identity logs you can stream to an endpoint
18+
# What are the identity logs you can stream to an endpoint?
1919

20-
Using Diagnostic settings in Microsoft Entra ID, you can route activity logs to several endpoints for long term retention and data insights. You select the logs you want to route, then select the endpoint.
20+
Using Microsoft Entra diagnostic settings, you can route activity logs to several endpoints for long term retention and data insights. You select the logs you want to route, then select the endpoint.
2121

22-
This article describes the logs that you can route to an endpoint from Microsoft Entra Diagnostic settings.
22+
This article describes the logs that you can route to an endpoint with Microsoft Entra diagnostic settings.
2323

24-
## Prerequisites
24+
## Log streaming requirements and options
2525

26-
Setting up an endpoint, such as an event hub or storage account, may require different roles and licenses. To create or edit a new Diagnostic setting, you need a user who's a **Security Administrator** or **Global Administrator** for the Microsoft Entra tenant.
26+
Setting up an endpoint, such as an event hub or storage account, may require different roles and licenses. To create or edit a new diagnostic setting, you need a user who's a **Security Administrator** or **Global Administrator** for the Microsoft Entra tenant.
2727

28-
To help decide which log routing option is best for you, see [How to access activity logs](howto-access-activity-logs.md). The overall process and requirements for each endpoint type are covered in the following articles.
28+
To help decide which log routing option is best for you, see [How to access activity logs](howto-access-activity-logs.md). The overall process and requirements for each endpoint type are covered in the following articles:
2929

3030
- [Send logs to a Log Analytics workspace to integrate with Azure Monitor logs](howto-integrate-activity-logs-with-azure-monitor-logs.md)
3131
- [Archive logs to a storage account](howto-archive-logs-to-storage-account.md)
@@ -34,7 +34,7 @@ To help decide which log routing option is best for you, see [How to access acti
3434

3535
## Activity log options
3636

37-
The following logs can be sent to an endpoint. Some logs may be in public preview but still visible in the portal.
37+
The following logs can be routed to an endpoint for storage, analysis, or monitoring.
3838

3939
### Audit logs
4040

articles/active-directory/reports-monitoring/concept-sign-ins.md

Lines changed: 12 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,9 +8,9 @@ ms.service: active-directory
88
ms.topic: conceptual
99
ms.workload: identity
1010
ms.subservice: report-monitor
11-
ms.date: 08/31/2023
11+
ms.date: 09/26/2023
1212
ms.author: sarahlipsey
13-
ms.reviewer: besiler
13+
ms.reviewer: egreenberg14
1414
---
1515
# What are Microsoft Entra sign-in logs?
1616

@@ -73,17 +73,23 @@ In addition to the default fields, the interactive sign-in log also shows:
7373

7474
**Non-interactive sign-ins on the interactive sign-in logs**
7575

76-
Previously, some non-interactive sign-ins from Microsoft Exchange clients were included in the interactive user sign-in log for better visibility. This increased visibility was necessary before the non-interactive user sign-in logs were introduced in November 2020. However, it's important to note that some non-interactive sign-ins, such as those using FIDO2 keys, may still be marked as interactive due to the way the system was set up before the separate non-interactive logs were introduced. These sign-ins may display interactive details like client credential type and browser information, even though they are technically non-interactive sign-ins.
76+
Previously, some non-interactive sign-ins from Microsoft Exchange clients were included in the interactive user sign-in log for better visibility. This increased visibility was necessary before the non-interactive user sign-in logs were introduced in November 2020. However, it's important to note that some non-interactive sign-ins, such as those using FIDO2 keys, may still be marked as interactive due to the way the system was set up before the separate non-interactive logs were introduced. These sign-ins may display interactive details like client credential type and browser information, even though they're technically non-interactive sign-ins.
7777

7878
**Passthrough sign-ins**
7979

80-
Microsoft Entra ID issues tokens for authentication and authorization. In some situations, a user who is signed in to the Contoso tenant may try to access resources in the Fabrikam tenant, where they don't have access. A no-authorization token, called a passthrough token, is issued to the Fabrikam tenant. The passthrough token doesn't allow the user to access any resources.
80+
Microsoft Entra ID issues tokens for authentication and authorization. In some situations, a user who is signed in to the Contoso tenant may try to access resources in the Fabrikam tenant, where they don't have access. A no-authorization token called a passthrough token, is issued to the Fabrikam tenant. The passthrough token doesn't allow the user to access any resources.
8181

8282
When reviewing the logs for this situation, the sign-in logs for the home tenant (in this scenario, Contoso) don't show a sign-in attempt because the token wasn't evaluated against the home tenant's policies. The sign-in token was only used to display the appropriate failure message. You won't see a sign-in attempt in the logs for the home tenant.
8383

84+
**First-party, app-only service principal sign-ins**
85+
86+
The service principal sign-in logs don't include first-party, app-only sign-in activity. This type of activity happens when first-party apps get tokens for an internal Microsoft job where there's no direction or context from a user. We exclude these logs so you're not paying for logs related to internal Microsoft tokens within your tenant.
87+
88+
You may identify Microsoft Graph events that don't correlate to a service principal sign-in if you're routing `MicrosoftGraphActivityLogs` with `SignInLogs` to the same Log Analytics workspace. This integration allows you to cross reference the token issued by the Microsoft Graph activity with the sign-in. The `UniqueTokenIdentifier` in the Microsoft Graph activity logs would be missing from the service principal sign-in logs.
89+
8490
### Non-interactive user sign-ins
8591

86-
Non-interactive sign-ins are done *on behalf of a* user. These sign-ins were performed by a client app or OS components on behalf of a user and don't require the user to provide an authentication factor. Instead, Microsoft Entra ID recognizes when the user's token needs to be refreshed and does so behind the scenes, without interrupting the user's session. In general, the user perceives these sign-ins as happening in the background.
92+
Non-interactive sign-ins are done *on behalf of a* user. These delegated sign-ins were performed by a client app or OS components on behalf of a user and don't require the user to provide an authentication factor. Instead, Microsoft Entra ID recognizes when the user's token needs to be refreshed and does so behind the scenes, without interrupting the user's session. In general, the user perceives these sign-ins as happening in the background.
8793

8894
![Screenshot of the non-interactive user sign-ins log.](media/concept-sign-ins/sign-in-logs-user-noninteractive.png)
8995

@@ -106,7 +112,7 @@ To make it easier to digest the data, non-interactive sign-in events are grouped
106112

107113
:::image type="content" source="media/concept-sign-ins/aggregate-sign-in.png" alt-text="Screenshot of an aggregate sign-in expanded to show all rows." lightbox="media/concept-sign-ins/aggregate-sign-in-expanded.png":::
108114

109-
When Microsoft Entra ID logs multiple sign-ins that are identical other than time and date, those sign-ins are from the same entity and are aggregated into a single row. A row with multiple identical sign-ins (except for date and time issued) has a value greater than 1 in the *# sign-ins* column. These aggregated sign-ins may also appear to have the same time stamps. The **Time aggregate** filter can set to 1 hour, 6 hours, or 24 hours. You can expand the row to see all the different sign-ins and their different time stamps.
115+
When Microsoft Entra ID logs multiple sign-ins that are identical other than time and date, those sign-ins are from the same entity and are aggregated into a single row. A row with multiple identical sign-ins (except for date and time issued) has a value greater than one in the *# sign-ins* column. These aggregated sign-ins may also appear to have the same time stamps. The **Time aggregate** filter can set to 1 hour, 6 hours, or 24 hours. You can expand the row to see all the different sign-ins and their different time stamps.
110116

111117
Sign-ins are aggregated in the non-interactive users when the following data matches:
112118

0 commit comments

Comments
 (0)