Skip to content

Commit 0f31609

Browse files
author
cabailey
committed
Merge branch 'release-ga-sentinel' of https://github.com/MicrosoftDocs/azure-docs-pr into cabailey-azuredocs-syslog
2 parents 9bab035 + 51540b8 commit 0f31609

File tree

418 files changed

+11851
-4326
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

418 files changed

+11851
-4326
lines changed

.openpublishing.redirection.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -41581,6 +41581,21 @@
4158141581
"redirect_url": "https://github.com/Azure-Samples/cognitive-services-quickstart-code/tree/master/php/ComputerVision/use-domain-model",
4158241582
"redirect_document_id": false
4158341583
},
41584+
{
41585+
"source_path": "articles/cognitive-services/Computer-vision/quickstarts-sdk/csharp-analyze-sdk.md",
41586+
"redirect_url": "/azure/cognitive-services/Computer-vision/quickstarts-sdk/csharp-sdk",
41587+
"redirect_document_id": false
41588+
},
41589+
{
41590+
"source_path": "articles/cognitive-services/Computer-vision/quickstarts-sdk/csharp-hand-text-sdk.md",
41591+
"redirect_url": "/azure/cognitive-services/Computer-vision/quickstarts-sdk/csharp-sdk",
41592+
"redirect_document_id": false
41593+
},
41594+
{
41595+
"source_path": "articles/cognitive-services/Computer-vision/quickstarts-sdk/csharp-thumb-sdk.md",
41596+
"redirect_url": "/azure/cognitive-services/Computer-vision/quickstarts-sdk/csharp-sdk",
41597+
"redirect_document_id": false
41598+
},
4158441599
{
4158541600
"source_path": "articles/cognitive-services/Content-Moderator/Review-Tool-User-Guide/Upload-Images.md",
4158641601
"redirect_url": "/azure/cognitive-services/content-moderator",

articles/active-directory-b2c/active-directory-b2c-reference-audit-logs.md

Lines changed: 23 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
2-
title: Audit logs samples and definitions in Azure Active Directory B2C | Microsoft Docs
3-
description: Guide and samples on accessing the Azure AD B2C Audit logs.
2+
title: Audit logs samples and definitions in Azure Active Directory B2C
3+
description: Guide and samples on accessing the Azure AD B2C audit logs.
44
services: active-directory-b2c
55
author: mmacy
66
manager: celestedg
77

88
ms.service: active-directory
99
ms.topic: conceptual
1010
ms.workload: identity
11-
ms.date: 08/04/2017
11+
ms.date: 09/14/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
ms.custom: fasttrack-edit
@@ -25,6 +25,7 @@ Azure Active Directory B2C (Azure AD B2C) emits audit logs containing activity i
2525
> You cannot see user sign-ins for individual Azure AD B2C applications under the **Users** section of the **Azure Active Directory** or **Azure AD B2C** blades. The sign-ins there will show user activity, but cannot be correlated back to the B2C application that the user signed in to. You must use the audit logs for that, as explained further in this article.
2626
2727
## Overview of activities available in the B2C category of audit logs
28+
2829
The **B2C** category in audit logs contains the following types of activities:
2930

3031
|Activity type |Description |
@@ -40,7 +41,8 @@ The **B2C** category in audit logs contains the following types of activities:
4041
> For user object CRUD activities, refer to the **Core Directory** category.
4142
4243
## Example activity
43-
The example below shows the data captured when a user signs in with an external identity provider:
44+
45+
The example below shows the data captured when a user signs in with an external identity provider:
4446
![Example of Audit Log Activity Details page in Azure portal](./media/active-directory-b2c-reference-audit-logs/audit-logs-example.png)
4547

4648
The activity details panel contains the following relevant information:
@@ -56,6 +58,7 @@ The activity details panel contains the following relevant information:
5658
| Additional Details | ApplicationId | The **Application ID** of the B2C application that the user is signing in to. |
5759

5860
## Accessing audit logs through the Azure portal
61+
5962
1. Go to the [Azure portal](https://portal.azure.com). Make sure you are in your B2C directory.
6063
2. Click on **Azure Active Directory** in the favorites bar on the left
6164

@@ -71,6 +74,7 @@ The activity details panel contains the following relevant information:
7174
![Category and Apply button highlighted in Audit Log filter](./media/active-directory-b2c-reference-audit-logs/audit-logs-portal-category.png)
7275

7376
You will see a list of activities logged over the last seven days.
77+
7478
- Use the **Activity Resource Type** dropdown to filter by the activity types outlined above
7579
- Use the **Date Range** dropdown to filter the date range of the activities shown
7680
- If you click on a specific row in the list, a contextual box on the right will show you additional attributes associated with the activity
@@ -80,28 +84,34 @@ You will see a list of activities logged over the last seven days.
8084
> You can also see the audit logs by navigating to **Azure AD B2C** rather than **Azure Active Directory** in the favorites bar on the left. Under **Activities**, click on **Audit logs**, where you will find the same logs with similar filtering capabilities.
8185
8286
## Accessing audit logs through the Azure AD reporting API
83-
Audit logs are published to the same pipeline as other activities for Azure Active Directory, so they can be accessed through the [Azure Active Directory reporting API](https://docs.microsoft.com/azure/active-directory/active-directory-reporting-api-audit-reference).
87+
88+
Audit logs are published to the same pipeline as other activities for Azure Active Directory, so they can be accessed through the [Azure Active Directory reporting API](https://docs.microsoft.com/graph/api/directoryaudit-list). For more information, see [Get started with the Azure Active Directory reporting API](../active-directory/reports-monitoring/concept-reporting-api.md).
8489

8590
### Prerequisites
91+
8692
To authenticate to the Azure AD reporting API you first need to register an application. Make sure to follow the steps in [Prerequisites to access the Azure AD reporting APIs](https://azure.microsoft.com/documentation/articles/active-directory-reporting-api-getting-started/).
8793

8894
### Accessing the API
95+
8996
To download the Azure AD B2C audit logs via the API, you'll want to filter the logs to the **B2C** category. To filter by category, use the query string parameter when calling the Azure AD reporting API endpoint, as shown below:
9097

91-
`https://graph.windows.net/your-b2c-tentant.onmicrosoft.com/activities/audit?api-version=beta&$filter=category eq 'B2C'`
98+
```HTTP
99+
https://graph.microsoft.com/v1.0/auditLogs/directoryAudits?filter=loggedByService eq 'B2C' and activityDateTime gt 2019-09-10T02:28:17Z
100+
```
92101

93102
### PowerShell script
94-
The following script provides an example of using PowerShell to query the Azure AD reporting API and store the results as a JSON file:
103+
104+
The following script provides an example of using PowerShell to query the Azure AD reporting API and outputting the results to a JSON file:
95105

96106
```powershell
97-
# This script will require registration of a Web Application in Azure Active Directory (see https://azure.microsoft.com/documentation/articles/active-directory-reporting-api-getting-started/)
107+
# This script requires the registration of a Web Application in Azure Active Directory (see https://docs.microsoft.com/azure/active-directory/reports-monitoring/concept-reporting-api)
98108
99109
# Constants
100-
$ClientID = "your-client-application-id-here" # Insert your application's Client ID, a Globally Unique ID (registered by Global Admin)
101-
$ClientSecret = "your-client-application-secret-here" # Insert your application's Client Key/Secret string
110+
$ClientID = "your-client-application-id-here" # Insert your application's Client ID, a GUID (registered by Global Admin)
111+
$ClientSecret = "your-client-application-secret-here" # Insert your application's Client secret/key
112+
$tenantdomain = "your-b2c-tenant.onmicrosoft.com" # Insert your Azure AD B2C tenant; for example, contoso.onmicrosoft.com
102113
$loginURL = "https://login.microsoftonline.com"
103-
$tenantdomain = "your-b2c-tenant.onmicrosoft.com" # AAD B2C Tenant; for example, contoso.onmicrosoft.com
104-
$resource = "https://graph.windows.net" # Azure AD Graph API resource URI
114+
$resource = "https://graph.microsoft.com" # Microsoft Graph API resource URI
105115
$7daysago = "{0:s}" -f (get-date).AddDays(-7) + "Z" # Use 'AddMinutes(-5)' to decrement minutes, for example
106116
Write-Output "Searching for events starting $7daysago"
107117
@@ -113,7 +123,7 @@ $oauth = Invoke-RestMethod -Method Post -Uri $loginURL/$tenantdomain/oauth2
113123
if ($oauth.access_token -ne $null) {
114124
$i=0
115125
$headerParams = @{'Authorization'="$($oauth.token_type) $($oauth.access_token)"}
116-
$url = 'https://graph.windows.net/' + $tenantdomain + '/activities/audit?api-version=beta&$filter=category eq ''B2C''and activityDate gt ' + $7daysago
126+
$url = "https://graph.microsoft.com/v1.0/auditLogs/directoryAudits?`$filter=loggedByService eq 'B2C' and activityDateTime gt " + $7daysago
117127
118128
# loop through each query page (1 through n)
119129
Do {

0 commit comments

Comments
 (0)