Skip to content

Commit 288c86d

Browse files
authored
Merge pull request #221348 from v-edmckillop/patch-43
Update plan-monitoring-and-reporting.md
2 parents 0d5e13d + cf08a6e commit 288c86d

File tree

1 file changed

+34
-34
lines changed

1 file changed

+34
-34
lines changed

articles/active-directory/reports-monitoring/plan-monitoring-and-reporting.md

Lines changed: 34 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -3,29 +3,28 @@
33
title: Plan reports & monitoring deployment - Azure AD
44
description: Describes how to plan and execute implementation of reporting and monitoring.
55
services: active-directory
6-
author: shlipsey3
7-
manager: amycolannino
6+
author: gargi-sinha
7+
manager: martinco
88
ms.service: active-directory
99
ms.topic: conceptual
1010
ms.workload: identity
1111
ms.subservice: report-monitor
1212
ms.date: 12/19/2022
1313
ms.author: sarahlipsey
1414
ms.reviewer: plenzke
15-
16-
# Customer intent: As an Azure AD administrator, I want to monitor logs and report on access to increase security
15+
# Customer intent: For an Azure AD administrator to monitor logs and report on access
1716
ms.collection: M365-identity-device-management
1817
---
1918

20-
# Plan an Azure Active Directory reporting and monitoring deployment
19+
# Azure Active Directory reporting and monitoring deployment dependencies
2120

22-
Your Azure Active Directory (Azure AD) reporting and monitoring solution depends on your legal, security, and operational requirements and your existing environment and processes. This article presents the various design options and guides you to the right deployment strategy.
21+
Your Azure Active Directory (Azure AD) reporting and monitoring solution depends on legal, security, operational requirements, and your environment's processes. Use the following sections to learn about design options and deployment strategy.
2322

24-
### Benefits of Azure AD reporting and monitoring
23+
## Benefits of Azure AD reporting and monitoring
2524

26-
Azure AD reporting provides a comprehensive view and logs of Azure AD activity in your environment, including sign-in events, audit events, and changes to your directory.
25+
Azure AD reporting has a view, and logs, of Azure AD activity in your environment: sign-in and audit events, also changes to your directory.
2726

28-
The provided data enables you to:
27+
Use data output to:
2928

3029
* determine how your apps and services are used.
3130
* detect potential risks affecting the health of your environment.
@@ -48,8 +47,9 @@ For detailed feature and licensing information, see the [Azure Active Directory
4847

4948
To deploy Azure AD monitoring and reporting you'll need a user who is a Global Administrator or Security Administrator for the Azure AD tenant.
5049

51-
Depending on the final destination of your log data, you'll need one of the following:
52-
50+
* [Azure Monitor data platform](../../azure-monitor/data-platform.md)
51+
* [Azure Monitor naming and terminology changes](../../azure-monitor/terminology.md)
52+
* [How long does Azure AD store reporting data?](./reference-reports-data-retention.md)
5353
* An Azure storage account that you have `ListKeys` permissions for. We recommend that you use a general storage account and not a Blob storage account. For storage pricing information, see the [Azure Storage pricing calculator](https://azure.microsoft.com/pricing/calculator/?service=storage).
5454
* An Azure Event Hubs namespace to integrate with third-party SIEM solutions.
5555
* An Azure Log Analytics workspace to send logs to Azure Monitor logs.
@@ -58,7 +58,7 @@ Depending on the final destination of your log data, you'll need one of the foll
5858

5959
Reporting and monitoring are used to meet your business requirements, gain insights into usage patterns, and increase your organization's security posture. In this project, you'll define the audiences that will consume and monitor reports, and define your Azure AD monitoring architecture.
6060

61-
### Engage the right stakeholders
61+
## Stakeholders, communications, and documentation
6262

6363
When technology projects fail, they typically do so due to mismatched expectations on effect, outcomes, and responsibilities. To avoid these pitfalls, [ensure that you're engaging the right stakeholders](../fundamentals/active-directory-deployment-plans.md). Also ensure that stakeholder roles in the project are well understood by documenting the stakeholders and their project input and responsibilities.
6464

@@ -75,13 +75,13 @@ The following roles can read Azure AD reports:
7575

7676
Learn More About [Azure AD Administrative Roles](../roles/permissions-reference.md). Always apply the concept of least privileges to reduce the risk of an account compromise. Consider implementing [Privileged Identity Management](../privileged-identity-management/pim-configure.md) to further secure your organization.
7777

78-
### Plan communications
78+
### Engage stakeholders
7979

80-
Communication is critical to the success of any new service. Proactively communicate with your users how their experience will change, when it will change, and how to gain support if they experience issues.
80+
Successful projects align expectations, outcomes, and responsibilities. See, [Azure Active Directory deployment plans](../fundamentals/active-directory-deployment-plans.md). Document and communicate stakeholder roles that require input and accountability.
8181

82-
### Document your current infrastructure and policies
82+
### Communications plan
8383

84-
Your current infrastructure and policies will drive your reporting and monitoring design. Ensure that you know
84+
Tell your users when, and how, their experience will change. Provide contact information for support.
8585

8686
* What, if any, SIEM tools you're using.
8787
* Your Azure infrastructure, including existing storage accounts and monitoring being used.
@@ -91,36 +91,35 @@ Your current infrastructure and policies will drive your reporting and monitorin
9191

9292
To better prioritize the use cases and solutions, organize the options by "required for solution to meet business needs," "nice to have to meet business needs," and "not applicable."
9393

94-
|Area |Description |
95-
|-|-|
96-
|Retention| **Log retention of more than 30 days**. ‎Due to legal or business requirements it's required to store audit logs and sign in logs of Azure AD longer than 30 days. |
97-
|Analytics| **The logs need to be searchable**. ‎The stored logs need to be searchable with analytic tools. |
98-
| Operational Insights| **Insights for various teams**. The need to give access for different users to gain operational insights such as application usage, sign in errors, self-service usage, trends, etc. |
99-
| Security Insights| **Insights for various teams**. The need to give access for different users to gain operational insights such as application usage, sign in errors, self service usage, trends, etc. |
100-
| Integration in SIEM systems | **SIEM integration**. ‎The need to integrate and stream Azure AD sign-in logs and audit logs to existing SIEM systems. |
94+
### Considerations
10195

102-
### Choose a monitoring solution architecture
96+
* **Retention** - Log retention: store audit logs and sign in logs of Azure AD longer than 30 days
97+
* **Analytics** - Logs are searchable with analytic tools
98+
* **Operational and security insights** - Provide access to application usage, sign-in errors, self-service usage, trends, etc.
99+
* **SIEM integration** - Integrate and stream Azure AD sign-in logs and audit logs to SIEM systems
103100

104-
With Azure AD monitoring, you can route your Azure AD activity logs to a system that best meets your business needs. You can then retain them for long-term reporting and analysis to gain insights into your environment, and integrate it with SIEM tools.
101+
### Monitoring solution architecture
105102

106-
#### Decision flow chart![An image showing what is described in subsequent sections](media/reporting-deployment-plan/deploy-reporting-flow-diagram.png)
103+
With Azure AD monitoring, you can route Azure AD activity logs and retain them for long-term reporting and analysis to gain environment insights, and integrate it with SIEM tools. Use the following decision flow chart to help select an architecture.
107104

108-
#### Archive logs in a storage account
105+
![Decision matrix for business-need architecture.](media/reporting-deployment-plan/deploy-reporting-flow-diagram.png)
109106

110-
By routing logs to an Azure storage account, you can keep them for longer than the default retention period outlined in our [retention policies](./reference-reports-data-retention.md). Use this method if you need to archive your logs, but don't need to integrate them with an SIEM system, and don't need ongoing queries and analysis. You can still do on-demand searches.
107+
#### Archive logs in a storage account
111108

112-
Learn how to [route data to your storage account](./quickstart-azure-monitor-route-logs-to-storage-account.md).
109+
You can keep logs longer than the default retention period by routing them to an Azure storage account.
113110

114-
#### Send logs to Azure Monitor logs
111+
> [!IMPORTANT]
112+
> Use this archival method if there is no need to integrate logs with a SIEM system, or no need for ongoing queries and analysis. You can use on-demand searches.
115113
116-
[Azure Monitor logs](../../azure-monitor/logs/log-query-overview.md) consolidate monitoring data from different sources. It also provides a query language and analytics engine that gives you insights into the operation of your applications and use of resources. By sending Azure AD activity logs to Azure Monitor logs, you can quickly retrieve, monitor, and alert on collected data. Use this method when you don't have an existing SIEM solution that you want to send your data to directly but do want queries and analysis. Once your data is in Azure Monitor logs, you can then send it to event hub, and from there to a SIEM if you want to.
114+
Learn more:
117115

118-
Learn how to [send data to Azure Monitor logs](./howto-integrate-activity-logs-with-log-analytics.md).
116+
* [How long does Azure AD store reporting data?](./reference-reports-data-retention.md)
117+
* [Tutorial: Archive Azure AD logs to an Azure storage account](./quickstart-azure-monitor-route-logs-to-storage-account.md)
119118

120119
#### Stream logs to storage and SIEM tools
121120

122-
Routing logs to an Azure event hub enables integration with third-party SIEM tools. This integration allows you to combine Azure AD activity log data with other data managed by your SIEM, to provide richer insights into your environment.
123-
121+
* [Integrate Azure AD logs with Azure Monitor logs](./howto-integrate-activity-logs-with-log-analytics.md).
122+
* [Analyze Azure AD activity logs with Azure Monitor logs](/MicrosoftDocs/azure-docs/blob/main/articles/active-directory/reports-monitoring/howto-analyze-activity-logs-log-analytics.md).
124123
* Learn how to [stream logs to an event hub](./tutorial-azure-monitor-stream-logs-to-event-hub.md).
125124
* Learn how to [Archive Azure AD logs to an Azure Storage account](./quickstart-azure-monitor-route-logs-to-storage-account.md).
126125
* [Integrate Azure AD logs with Splunk by using Azure Monitor](./howto-integrate-activity-logs-with-splunk.md)
@@ -132,3 +131,4 @@ Routing logs to an Azure event hub enables integration with third-party SIEM too
132131
- Consider implementing [Azure role-based access control](../../role-based-access-control/overview.md)
133132
- [Learn more about report retention policies](./reference-reports-data-retention.md).
134133
- [Analyze Azure AD activity logs with Azure Monitor logs](./howto-analyze-activity-logs-log-analytics.md)
134+

0 commit comments

Comments
 (0)