Skip to content

Commit 1f97493

Browse files
authored
Merge pull request #296394 from guywi-ms/entra-id-connector-updates
Update connect-azure-active-directory.md
2 parents 600419f + 7437967 commit 1f97493

File tree

2 files changed

+48
-40
lines changed

2 files changed

+48
-40
lines changed

articles/sentinel/configure-data-connector.md

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -50,6 +50,8 @@ After you or someone in your organization installs the solution that includes th
5050

5151
:::image type="content" source="media/configure-data-connector/open-connector-page-option-defender-portal.png" alt-text="Screenshot of data connector details page in the Defender portal.":::
5252

53+
---
54+
5355
1. Review the **Prerequisites**. To configure the data connector, fulfill all the prerequisites.
5456
1. Follow the steps outlined in the **Configurations** section.
5557

@@ -61,6 +63,22 @@ After you or someone in your organization installs the solution that includes th
6163

6264
:::image type="content" source="media/configure-data-connector/connected-data-connector.png" alt-text="Screenshot of a data connector page with status connected and graph that shows the data received.":::
6365

66+
## Find your data
67+
68+
After you enable the connector successfully, the connector begins to stream data to the table schemas related to the data types you configurated.
69+
70+
To view the data:
71+
72+
#### [Azure portal](#tab/azure-portal-1)
73+
74+
Query the tables in the Microsoft Sentinel workspace linked to your Microsoft Sentinel workspace.
75+
76+
#### [Defender portal](#tab/defender-portal-1)
77+
78+
See [Where to find your Microsoft Sentinel data in Microsoft Defender portal](/defender-xdr/advanced-hunting-microsoft-defender#where-to-find-your-microsoft-sentinel-data).
79+
80+
---
81+
6482
## Find support for a data connector
6583

6684
Both Microsoft and other organizations author Microsoft Sentinel data connectors. Find the support contact from data connector page in Microsoft Sentinel.

articles/sentinel/connect-azure-active-directory.md

Lines changed: 30 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -1,34 +1,41 @@
11
---
2-
title: Connect Microsoft Entra data to Microsoft Sentinel | Microsoft Docs
2+
title: Send Microsoft Entra ID data to Microsoft Sentinel
33
description: Learn how to collect data from Microsoft Entra ID, and stream Microsoft Entra sign-in, audit, and provisioning logs into Microsoft Sentinel.
4-
author: yelevin
4+
author: guywi-ms
55
ms.topic: how-to
6-
ms.date: 05/13/2024
7-
ms.author: yelevin
6+
ms.date: 03/16/2025
7+
ms.author: guywild
88

99

1010
#Customer intent: As a security engineer, I want to stream Microsoft Entra logs into Microsoft Sentinel so that analysts can monitor and analyze sign-in activities, audit logs, and provisioning logs for enhanced security and threat detection.
1111

1212
---
1313

14-
# Connect Microsoft Entra data to Microsoft Sentinel
14+
# Send data to Microsoft Sentinel using the Microsoft Entra ID data connector
1515

16-
You can use Microsoft Sentinel's built-in connector to collect data from [Microsoft Entra ID](../active-directory/fundamentals/active-directory-whatis.md) and stream it into Microsoft Sentinel. The connector allows you to stream the following log types:
16+
[Microsoft Entra ID](/entra/fundamentals/what-is-entra) logs provide comprehensive information about users, applications, and networks accessing your Entra tenant. This article explains the types of logs you can collect using the Microsoft Entra ID data connector, how to enable the connector to send data to Microsoft Sentinel, and how to find your data in Microsoft Sentinel.
1717

18-
- [**Sign-in logs**](../active-directory/reports-monitoring/concept-all-sign-ins.md), which contain information about interactive user sign-ins where a user provides an authentication factor.
18+
## Microsoft Entra ID data connector data types
1919

20-
The Microsoft Entra connector now includes the following three additional categories of sign-in logs, all currently in **PREVIEW**:
21-
22-
- [**Non-interactive user sign-in logs**](../active-directory/reports-monitoring/concept-all-sign-ins.md#non-interactive-user-sign-ins), which contain information about sign-ins performed by a client on behalf of a user without any interaction or authentication factor from the user.
23-
24-
- [**Service principal sign-in logs**](../active-directory/reports-monitoring/concept-all-sign-ins.md#service-principal-sign-ins), which contain information about sign-ins by apps and service principals that don't involve any user. In these sign-ins, the app or service provides a credential on its own behalf to authenticate or access resources.
25-
26-
- [**Managed Identity sign-in logs**](../active-directory/reports-monitoring/concept-all-sign-ins.md#managed-identity-for-azure-resources-sign-ins), which contain information about sign-ins by Azure resources that have secrets managed by Azure. For more information, see [What are managed identities for Azure resources?](../active-directory/managed-identities-azure-resources/overview.md)
20+
This table lists the logs you can send from Microsoft Entra ID to Microsoft Sentinel using the Microsoft Entra ID data connector. Sentinel stores these logs in the Log Analytics workspace linked to your Microsoft Sentinel workspace.
2721

28-
- [**Audit logs**](../active-directory/reports-monitoring/concept-audit-logs.md), which contain information about system activity relating to user and group management, managed applications, and directory activities.
29-
30-
- [**Provisioning logs**](../active-directory/reports-monitoring/concept-provisioning-logs.md) (also in **PREVIEW**), which contain system activity information about users, groups, and roles provisioned by the Microsoft Entra provisioning service.
31-
- [**Microsoft Graph activity logs**](/graph/microsoft-graph-activity-logs-overview), which contain information about HTTP requests accessing your tenant’s resources through the Microsoft Graph API.
22+
| **Log type** | **Description** | **Log schema** |
23+
|--------------|-----------------------------------|----------------|
24+
| [**Audit logs**](../active-directory/reports-monitoring/concept-audit-logs.md) | System activity related to user and group management, managed applications, and directory activities. | [AuditLogs](/azure/azure-monitor/reference/tables/auditlogs) |
25+
| [**Sign-in logs**](../active-directory/reports-monitoring/concept-all-sign-ins.md) | Interactive user sign-ins where a user provides an authentication factor. | [SigninLogs](/azure/azure-monitor/reference/tables/signinlogs) |
26+
| [**Non-interactive user sign-in logs**](../active-directory/reports-monitoring/concept-all-sign-ins.md#non-interactive-user-sign-ins) (**Preview**) | Sign-ins performed by a client on behalf of a user without any interaction or authentication factor from the user. | [AADNonInteractiveUserSignInLogs](/azure/azure-monitor/reference/tables/aadnoninteractiveusersigninlogs) |
27+
| [**Service principal sign-in logs**](../active-directory/reports-monitoring/concept-all-sign-ins.md#service-principal-sign-ins) (**Preview**) | Sign-ins by apps and service principals that don't involve any user. In these sign-ins, the app or service provides a credential on its own behalf to authenticate or access resources. | [AADServicePrincipalSignInLogs](/azure/azure-monitor/reference/tables/aadserviceprincipalsigninlogs) |
28+
| [**Managed Identity sign-in logs**](../active-directory/reports-monitoring/concept-all-sign-ins.md#managed-identity-for-azure-resources-sign-ins) (**Preview**) | Sign-ins by Azure resources that have secrets managed by Azure. For more information, see [What are managed identities for Azure resources?](../active-directory/managed-identities-azure-resources/overview.md). | [AADManagedIdentitySignInLogs](/azure/azure-monitor/reference/tables/aadmanagedidentitysigninlogs) |
29+
| [**AD FS sign-in logs**](/entra/identity/monitoring-health/concept-usage-insights-report#ad-fs-application-activity) | Sign-ins performed through Active Directory Federation Services (AD FS). | [ADFSSignInLogs](/azure/azure-monitor/reference/tables/adfssigninlogs) |
30+
| [**Enriched Office 365 audit logs**](/entra/global-secure-access/how-to-view-enriched-logs) | Security events related to Microsoft 365 apps. | [EnrichedOffice365AuditLogs](/azure/azure-monitor/reference/tables/enrichedmicrosoft365auditlogs) |
31+
| [**Provisioning logs**](../active-directory/reports-monitoring/concept-provisioning-logs.md) (**Preview**) | System activity information about users, groups, and roles provisioned by the Microsoft Entra provisioning service. | [AADProvisioningLogs](/azure/azure-monitor/reference/tables/aadprovisioninglogs) |
32+
| [**Microsoft Graph activity logs**](/graph/microsoft-graph-activity-logs-overview)| HTTP requests accessing your tenant’s resources through the Microsoft Graph API. | [MicrosoftGraphActivityLogs](/azure/azure-monitor/reference/tables/microsoftgraphactivitylogs) |
33+
| [**Network access traffic logs**](/entra/global-secure-access/how-to-view-traffic-logs) | Network access traffic and activities. | [NetworkAccessTraffic](/azure/azure-monitor/reference/tables/networkaccesstraffic) |
34+
| [**Remote network health logs**](/entra/global-secure-access/how-to-remote-network-health-logs?tabs=microsoft-entra-admin-center) | Insights into the health of remote networks. | [RemoteNetworkHealthLogs](/azure/azure-monitor/reference/tables/remotenetworkhealthlogs) |
35+
| [**User risk events**](/entra/id-protection/howto-identity-protection-investigate-risk?branch=main#risk-detections-report) | User risk events generated by Microsoft Entra ID Protection. | [AADUserRiskEvents](/azure/azure-monitor/reference/tables/aaduserriskevents) |
36+
| [**Risky users**](/entra/id-protection/howto-identity-protection-investigate-risk#risky-users-rport) | Risky users logged by Microsoft Entra ID Protection. | [AADRiskyUsers](/azure/azure-monitor/reference/tables/aadriskyusers) |
37+
| [**Risky service principals**](/entra/id-protection/howto-identity-protection-investigate-risk?branh=main#risk-detections-report) | Information about service principals flagged as risky by Microsoft Entra ID Protection. | [AADRiskyServicePrincipals](/azure/azure-monitor/reference/tables/aadriskyserviceprincipals) |
38+
| [**Service principal risk events**](/entra/id-protection/howto-identity-protection-investigate-risk#risy-users-report) | Risk detections associated with service principals logged by Microsoft Entra ID Protection. | [AADServicePrincipalRiskEvents](/azure/azure-monitor/reference/tables/aadserviceprincipalriskevents) |
3239

3340
> [!IMPORTANT]
3441
> Some of the available log types are currently in **PREVIEW**. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for other legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
@@ -37,40 +44,23 @@ You can use Microsoft Sentinel's built-in connector to collect data from [Micros
3744

3845
## Prerequisites
3946

40-
- A Microsoft Entra ID P1 or P2 license is required to ingest sign-in logs into Microsoft Sentinel. Any Microsoft Entra ID license (Free/O365/P1 or P2) is sufficient to ingest the other log types. Other per-gigabyte charges may apply for Azure Monitor (Log Analytics) and Microsoft Sentinel.
47+
- A Microsoft Entra ID P1 or P2 license is required to ingest sign-in logs into Microsoft Sentinel. Any Microsoft Entra ID license (Free/O365/P1 or P2) is sufficient to ingest the other log types. Other per-gigabyte charges might apply for Azure Monitor (Log Analytics) and Microsoft Sentinel.
4148

4249
- Your user must be assigned the [Microsoft Sentinel Contributor](../role-based-access-control/built-in-roles.md#microsoft-sentinel-contributor) role on the workspace.
4350

4451
- Your user must have the [Security Administrator](../active-directory/roles/permissions-reference.md#security-administrator) role on the tenant you want to stream the logs from, or the equivalent permissions.
4552

4653
- Your user must have read and write permissions to the Microsoft Entra diagnostic settings in order to be able to see the connection status.
47-
- Install the solution for **Microsoft Entra ID** from the **Content Hub** in Microsoft Sentinel. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md).
4854

4955
<a name='connect-to-azure-active-directory'></a>
5056

51-
## Connect to Microsoft Entra ID
52-
53-
1. In Microsoft Sentinel, select **Data connectors** from the navigation menu.
54-
55-
1. From the data connectors gallery, select **Microsoft Entra ID** and then select **Open connector page**.
56-
57-
1. Mark the check boxes next to the log types you want to stream into Microsoft Sentinel, and select **Connect**.
58-
59-
## Find your data
60-
61-
After a successful connection is established, the data appears in **Logs**, under the **LogManagement** section, in the following tables:
57+
## Enable the Microsoft Entra ID data connector
6258

63-
- `SigninLogs`
64-
- `AuditLogs`
65-
- `AADNonInteractiveUserSignInLogs`
66-
- `AADServicePrincipalSignInLogs`
67-
- `AADManagedIdentitySignInLogs`
68-
- `AADProvisioningLogs`
69-
- `MSGraphActivityLogs`
59+
Search for and enable the **Microsoft Entra ID** connector as described in [Enable a data connector](configure-data-connector.md#enable-a-data-connector).
7060

71-
To query the Microsoft Entra logs, enter the relevant table name at the top of the query window.
61+
## Install the Microsoft Entra ID solution (optional)
7262

73-
If an expected table is not available, verify the log categories are selected for your Microsoft Sentinel workspace in Microsoft Entra diagnostic settings. For more informatoin, see [Configure Microsoft Entra diagnostic settings for activity logs](/entra/identity/monitoring-health/howto-configure-diagnostic-settings).
63+
Install the solution for **Microsoft Entra ID** from the **Content Hub** in Microsoft Sentinel to get prebuilt workbooks, analytics rules, playbooks, and more. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md).
7464

7565
## Next steps
7666
In this document, you learned how to connect Microsoft Entra ID to Microsoft Sentinel. To learn more about Microsoft Sentinel, see the following articles:

0 commit comments

Comments
 (0)