You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/concept-activity-logs-azure-monitor.md
+5-35Lines changed: 5 additions & 35 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,24 +2,17 @@
2
2
title: Azure Active Directory activity logs in Azure Monitor | Microsoft Docs
3
3
description: Introduction to Azure Active Directory activity logs in Azure Monitor
4
4
services: active-directory
5
-
documentationcenter: ''
6
-
author: MarkusVi
5
+
author: shlipsey3
7
6
manager: amycolannino
8
-
editor: ''
9
-
10
-
ms.assetid: 4b18127b-d1d0-4bdc-8f9c-6a4c991c5f75
11
7
ms.service: active-directory
12
8
ms.topic: conceptual
13
-
ms.tgt_pltfrm: na
14
9
ms.workload: identity
15
10
ms.subservice: report-monitor
16
-
ms.date: 08/26/2022
17
-
ms.author: markvi
11
+
ms.date: 10/03/2022
12
+
ms.author: sarahlipsey
18
13
ms.reviewer: besiler
19
-
20
14
ms.collection: M365-identity-device-management
21
15
---
22
-
23
16
# Azure AD activity logs in Azure Monitor
24
17
25
18
You can route Azure Active Directory (Azure AD) activity logs to several endpoints for long term retention and data insights. This feature allows you to:
@@ -31,25 +24,21 @@ You can route Azure Active Directory (Azure AD) activity logs to several endpoin
You can route Azure AD audit logs and sign-in logs to your Azure Storage account, event hub, Azure Monitor logs, or custom solution by using this feature.
39
30
40
31
***Audit logs**: The [audit logs activity report](concept-audit-logs.md) gives you access to information about changes applied to your tenant, such as users and group management, or updates applied to your tenant’s resources.
41
32
***Sign-in logs**: With the [sign-in activity report](concept-sign-ins.md), you can determine who performed the tasks that are reported in the audit logs.
42
33
43
-
44
-
45
34
## Prerequisites
46
35
47
36
To use this feature, you need:
48
37
49
38
* An Azure subscription. If you don't have an Azure subscription, you can [sign up for a free trial](https://azure.microsoft.com/free/).
50
39
* Azure AD Free, Basic, Premium 1, or Premium 2 [license](https://www.microsoft.com/security/business/identity-access-management/azure-ad-pricing), to access the Azure AD audit logs in the Azure portal.
51
40
* An Azure AD tenant.
52
-
* A user who's a **global administrator** or **security administrator** for the Azure AD tenant.
41
+
* A user who's a **Global Administrator** or **Security Administrator** for the Azure AD tenant.
53
42
* Azure AD Premium 1, or Premium 2 [license](https://www.microsoft.com/security/business/identity-access-management/azure-ad-pricing), to access the Azure AD sign-in logs in the Azure portal.
54
43
55
44
Depending on where you want to route the audit log data, you need either of the following:
@@ -78,14 +67,6 @@ The following table contains a cost estimate of, depending on the size of the te
Events are batched into approximately five-minute intervals and sent as a single message that contains all the events within that timeframe. A message in the Event Hub has a maximum size of 256 KB, and if the total size of all the messages within the timeframe exceeds that volume, multiple messages are sent.
@@ -103,23 +84,12 @@ The following table contains estimated costs per month for a basic Event Hub in
103
84
104
85
### Azure Monitor logs cost considerations
105
86
106
-
107
-
108
87
| Log category | Number of users | Events per day | Events per month (30 days) | Cost per month in USD (est.) |
To review costs related to managing the Azure Monitor logs, see [Azure Monitor Logs pricing details](../../azure-monitor/logs/cost-logs.md).
124
94
125
95
## Frequently asked questions
@@ -174,7 +144,7 @@ This section answers frequently asked questions and discusses known issues with
174
144
175
145
**Q: What SIEM tools are currently supported?**
176
146
177
-
**A**: **A**: Currently, Azure Monitor is supported by [Splunk](./howto-integrate-activity-logs-with-splunk.md), IBM QRadar, [Sumo Logic](https://help.sumologic.com/Send-Data/Applications-and-Other-Data-Sources/Azure_Active_Directory), [ArcSight](./howto-integrate-activity-logs-with-arcsight.md), LogRhythm, and Logz.io. For more information about how the connectors work, see [Stream Azure monitoring data to an event hub for consumption by an external tool](../../azure-monitor/essentials/stream-monitoring-data-event-hubs.md).
147
+
**A**: Currently, Azure Monitor is supported by [Splunk](./howto-integrate-activity-logs-with-splunk.md), IBM QRadar, [Sumo Logic](https://help.sumologic.com/Send-Data/Applications-and-Other-Data-Sources/Azure_Active_Directory), [ArcSight](./howto-integrate-activity-logs-with-arcsight.md), LogRhythm, and Logz.io. For more information about how the connectors work, see [Stream Azure monitoring data to an event hub for consumption by an external tool](../../azure-monitor/essentials/stream-monitoring-data-event-hubs.md).
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/concept-all-sign-ins.md
+13-61Lines changed: 13 additions & 61 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,35 +2,28 @@
2
2
title: Sign-in logs in Azure Active Directory - preview | Microsoft Docs
3
3
description: Overview of the sign-in logs in Azure Active Directory including new features in preview.
4
4
services: active-directory
5
-
documentationcenter: ''
6
-
author: MarkusVi
5
+
author: shlipsey3
7
6
manager: amycolannino
8
-
editor: ''
9
-
10
-
ms.assetid: 4b18127b-d1d0-4bdc-8f9c-6a4c991c5f75
11
7
ms.service: active-directory
12
8
ms.topic: conceptual
13
-
ms.tgt_pltfrm: na
14
9
ms.workload: identity
15
10
ms.subservice: report-monitor
16
-
ms.date: 08/26/2022
17
-
ms.author: markvi
11
+
ms.date: 10/03/2022
12
+
ms.author: sarahlipsey
18
13
ms.reviewer: besiler
19
-
20
14
ms.collection: M365-identity-device-management
21
15
---
22
16
# Sign-in logs in Azure Active Directory - preview
23
17
24
18
As an IT administrator, you want to know how your IT environment is doing. The information about your system’s health enables you to assess whether and how you need to respond to potential issues.
25
19
26
-
To support you with this goal, the Azure Active Directory portal gives you access to three activity logs:
20
+
To support you with this goal, the Azure Active Directory (Azure AD) portal gives you access to three activity logs:
27
21
28
22
-**[Sign-in](concept-sign-ins.md)** – Information about sign-ins and how your resources are used by your users.
29
-
-**[Audit](concept-audit-logs.md)** – Information about changes applied to your tenant such as users and group management or updates applied to your tenant’s resources.
30
-
-**[Provisioning](concept-provisioning-logs.md)** – Activities performed by the provisioning service, such as the creation of a group in ServiceNow or a user imported from Workday.
31
-
23
+
-**[Audit](concept-audit-logs.md)** – Information about changes applied to your tenant, such as users and group management or updates applied to your tenant’s resources.
24
+
-**[Provisioning](concept-provisioning-logs.md)** – Activities performed by a provisioning service, such as the creation of a group in ServiceNow or a user imported from Workday.
32
25
33
-
The classic sign-in log in Azure Active Directory provides you with an overview of interactive user sign-ins. In addition, you now have access to three additional sign-in logs that are now in preview:
26
+
The classic sign-in log in Azure AD provides you with an overview of interactive user sign-ins. Three additional sign-in logs are now in preview:
34
27
35
28
- Non-interactive user sign-ins
36
29
@@ -40,8 +33,6 @@ The classic sign-in log in Azure Active Directory provides you with an overview
40
33
41
34
This article gives you an overview of the sign-in activity report with the preview of non-interactive, application, and managed identities for Azure resources sign-ins. For information about the sign-in report without the preview features, see [Sign-in logs in Azure Active Directory](concept-sign-ins.md).
42
35
43
-
44
-
45
36
## What can you do with it?
46
37
47
38
The sign-in log provides answers to questions like:
@@ -65,16 +56,13 @@ The sign-in log provides answers to questions like:
65
56
66
57
The sign-in activity report is available in [all editions of Azure AD](reference-reports-data-retention.md#how-long-does-azure-ad-store-the-data). If you have an Azure Active Directory P1 or P2 license, you also can access the sign-in activity report through the Microsoft Graph API. See [Getting started with Azure Active Directory Premium](../fundamentals/active-directory-get-started-premium.md) to upgrade your Azure Active Directory edition. It will take a couple of days for the data to show up in Graph after you upgrade to a premium license with no data activities before the upgrade.
67
58
68
-
69
-
70
-
71
59
## Where can you find it in the Azure portal?
72
60
73
61
The Azure portal provides you with several options to access the log. For example, on the Azure Active Directory menu, you can open the log in the **Monitoring** section.

76
64
77
-
Additionally, you can get directly get to the sign-in log using this link: [https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/SignIns](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/SignIns)
65
+
Additionally, you can access the sign-in log using this link: [https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/SignIns](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/SignIns)
78
66
79
67
On the sign-ins page, you can switch between:
80
68
@@ -87,9 +75,7 @@ On the sign-ins page, you can switch between:
87
75
-**Managed identities for Azure resources sign-ins** - Sign-ins by Azure resources that have secrets managed by Azure. For more information, see [What are managed identities for Azure resources?](../managed-identities-azure-resources/overview.md)

93
79
94
80
Each tab on the sign-ins page shows the default columns below. Some tabs have additional columns:
95
81
@@ -105,18 +91,13 @@ Each tab on the sign-ins page shows the default columns below. Some tabs have ad
105
91
106
92
- IP address of the device used for the sign-in
107
93
108
-
109
-
110
94
### Interactive user sign-ins
111
95
112
-
113
96
Interactive user sign-ins are sign-ins where a user provides an authentication factor to Azure AD or interacts directly with Azure AD or a helper app, such as the Microsoft Authenticator app. The factors users provide include passwords, responses to MFA challenges, biometric factors, or QR codes that a user provides to Azure AD or to a helper app.
114
97
115
98
> [!NOTE]
116
99
> This log also includes federated sign-ins from identity providers that are federated to Azure AD.
117
100
118
-
119
-
120
101
> [!NOTE]
121
102
> The interactive user sign-in log used to contain some non-interactive sign-ins from Microsoft Exchange clients. Although those sign-ins were non-interactive, they were included in the interactive user sign-in log for additional visibility. Once the non-interactive user sign-in log entered public preview in November 2020, those non-interactive sign-in logs were moved to the non-interactive user sign in log for increased accuracy.
122
103
@@ -139,24 +120,13 @@ In addition to the default fields, the interactive sign-in log also shows:
139
120
140
121
- Whether conditional access has been applied
141
122
142
-
143
-
144
123
You can customize the list view by clicking **Columns** in the toolbar.
145
124
146
-

147
-
148
-
149
-
150
-
125
+

151
126
152
127
Customizing the view enables you to display additional fields or remove fields that are already displayed.

193
156
194
157
To make it easier to digest the data, non-interactive sign-in events are grouped. Clients often create many non-interactive sign-ins on behalf of the same user in a short time period, which share all the same characteristics except for the time the sign-in was attempted. For example, a client may get an access token once per hour on behalf of a user. If the user or client do not change state, the IP address, resource, and all other information is the same for each access token request. When Azure AD logs multiple sign-ins that are identical other than time and date, those sign-ins will be from the same entity are aggregated into a single row. A row with multiple identical sign-ins (except for date and time issued) will have a value greater than 1 in the # sign-ins column. You can expand the row to see all the different sign-ins and their different time stamps. Sign-ins are aggregated in the non-interactive users when the following data matches:
195
158
196
-
197
159
- Application
198
160
199
161
- User
@@ -204,14 +166,8 @@ To make it easier to digest the data, non-interactive sign-in events are grouped
204
166
205
167
- Resource ID
206
168
207
-
208
-
209
-
210
-
211
169
The IP address of non-interactive sign-ins doesn't match the actual source IP of where the refresh token request is coming from. Instead, it shows the original IP used for the original token issuance.
212
170
213
-
214
-
215
171
## Service principal sign-ins
216
172
217
173
Unlike interactive and non-interactive user sign-ins, service principal sign-ins do not involve a user. Instead, they are sign-ins by any non-user account, such as apps or service principals (except managed identity sign-in, which are in included only in the managed identity sign-in log). In these sign-ins, the app or service provides its own credential, such as a certificate or app secret to authenticate or access resources.
@@ -257,10 +213,6 @@ To make it easier to digest the data in the service principal sign-in logs, serv
257
213
258
214
- Resource name or ID
259
215
260
-
261
-
262
-
263
-
264
216
## Managed identity for Azure resources sign-ins
265
217
266
218
Managed identity for Azure resources sign-ins are sign-ins that were performed by resources that have their secrets managed by Azure to simplify credential management.
0 commit comments