You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Enable security and DNS audits for Microsoft Entra Domain Services
19
19
20
-
Microsoft Entra Domain Services (Microsoft Entra DS) security and DNS audits let Azure stream events to targeted resources. These resources include Azure Storage, Azure Log Analytics workspaces, or Azure Event Hub. After you enable security audit events, Microsoft Entra DS sends all the audited events for the selected category to the targeted resource.
20
+
Microsoft Entra Domain Services security and DNS audits let Azure stream events to targeted resources. These resources include Azure Storage, Azure Log Analytics workspaces, or Azure Event Hub. After you enable security audit events, Domain Services sends all the audited events for the selected category to the targeted resource.
21
21
22
22
You can archive events into Azure storage and stream events into security information and event management (SIEM) software (or equivalent) using Azure Event Hubs, or do your own analysis and using Azure Log Analytics workspaces from the Microsoft Entra admin center.
23
23
24
24
## Security audit destinations
25
25
26
-
You can use Azure Storage, Azure Event Hubs, or Azure Log Analytics workspaces as a target resource for Microsoft Entra DS security audits. These destinations can be combined. For example, you could use Azure Storage for archiving security audit events, but an Azure Log Analytics workspace to analyze and report on the information in the short term.
26
+
You can use Azure Storage, Azure Event Hubs, or Azure Log Analytics workspaces as a target resource for Domain Services security audits. These destinations can be combined. For example, you could use Azure Storage for archiving security audit events, but an Azure Log Analytics workspace to analyze and report on the information in the short term.
27
27
28
28
The following table outlines scenarios for each destination resource type.
29
29
30
30
> [!IMPORTANT]
31
-
> You need to create the target resource before you enable Microsoft Entra DS security audits. You can create these resources using the Microsoft Entra admin center, Azure PowerShell, or the Azure CLI.
31
+
> You need to create the target resource before you enable Domain Services security audits. You can create these resources using the Microsoft Entra admin center, Azure PowerShell, or the Azure CLI.
32
32
33
33
| Target Resource | Scenario |
34
34
|:---|:---|
35
-
|Azure Storage| This target should be used when your primary need is to store security audit events for archival purposes. Other targets can be used for archival purposes, however those targets provide capabilities beyond the primary need of archiving. <br /><br />Before you enable Microsoft Entra DS security audit events, first [Create an Azure Storage account](../storage/common/storage-account-create.md).|
36
-
|Azure Event Hubs| This target should be used when your primary need is to share security audit events with additional software such as data analysis software or security information & event management (SIEM) software.<br /><br />Before you enable Microsoft Entra DS security audit events, [Create an event hub using Microsoft Entra admin center](../event-hubs/event-hubs-create.md)|
37
-
|Azure Log Analytics Workspace| This target should be used when your primary need is to analyze and review secure audits from the Microsoft Entra admin center directly.<br /><br />Before you enable Microsoft Entra DS security audit events, [Create a Log Analytics workspace in the Microsoft Entra admin center.](../azure-monitor/logs/quick-create-workspace.md)|
35
+
|Azure Storage| This target should be used when your primary need is to store security audit events for archival purposes. Other targets can be used for archival purposes, however those targets provide capabilities beyond the primary need of archiving. <br /><br />Before you enable Domain Services security audit events, first [Create an Azure Storage account](../storage/common/storage-account-create.md).|
36
+
|Azure Event Hubs| This target should be used when your primary need is to share security audit events with additional software such as data analysis software or security information & event management (SIEM) software.<br /><br />Before you enable Domain Services security audit events, [Create an event hub using Microsoft Entra admin center](../event-hubs/event-hubs-create.md)|
37
+
|Azure Log Analytics Workspace| This target should be used when your primary need is to analyze and review secure audits from the Microsoft Entra admin center directly.<br /><br />Before you enable Domain Services security audit events, [Create a Log Analytics workspace in the Microsoft Entra admin center.](../azure-monitor/logs/quick-create-workspace.md)|
38
38
39
39
## Enable security audit events using the Microsoft Entra admin center
40
40
41
-
To enable Microsoft Entra DS security audit events using the Microsoft Entra admin center, complete the following steps.
41
+
To enable Domain Services security audit events using the Microsoft Entra admin center, complete the following steps.
42
42
43
43
> [!IMPORTANT]
44
-
> Microsoft Entra DS security audits aren't retroactive. You can't retrieve or replay events from the past. Microsoft Entra DS can only send events that occur after security audits are enabled.
44
+
> Domain Services security audits aren't retroactive. You can't retrieve or replay events from the past. Domain Services can only send events that occur after security audits are enabled.
45
45
46
46
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a Global Administrator.
47
47
1. Search for and select **Microsoft Entra Domain Services**. Choose your managed domain, such as *aaddscontoso.com*.
48
-
1. In the Microsoft Entra DS window, select **Diagnostic settings** on the left-hand side.
48
+
1. In the Domain Services window, select **Diagnostic settings** on the left-hand side.
49
49
1. No diagnostics are configured by default. To get started, select **Add diagnostic setting**.
50
50
51
51

@@ -71,14 +71,14 @@ To enable Microsoft Entra DS security audit events using the Microsoft Entra adm
71
71
72
72
You can select different log categories for each targeted resource within a single configuration. This ability lets you choose which logs categories you want to keep for Log Analytics and which logs categories you want to archive, for example.
73
73
74
-
1. When done, select **Save** to commit your changes. The target resources start to receive Microsoft Entra DS audit events soon after the configuration is saved.
74
+
1. When done, select **Save** to commit your changes. The target resources start to receive Domain Services audit events soon after the configuration is saved.
75
75
76
76
## Enable security and DNS audit events using Azure PowerShell
77
77
78
-
To enable Microsoft Entra DS security and DNS audit events using Azure PowerShell, complete the following steps. If needed, first [install the Azure PowerShell module and connect to your Azure subscription](/powershell/azure/install-azure-powershell).
78
+
To enable Domain Services security and DNS audit events using Azure PowerShell, complete the following steps. If needed, first [install the Azure PowerShell module and connect to your Azure subscription](/powershell/azure/install-azure-powershell).
79
79
80
80
> [!IMPORTANT]
81
-
> Microsoft Entra DS audits aren't retroactive. You can't retrieve or replay events from the past. Microsoft Entra DS can only send events that occur after audits are enabled.
81
+
> Domain Services audits aren't retroactive. You can't retrieve or replay events from the past. Domain Services can only send events that occur after audits are enabled.
82
82
83
83
1. Authenticate to your Azure subscription using the [Connect-AzAccount](/powershell/module/Az.Accounts/Connect-AzAccount) cmdlet. When prompted, enter your account credentials.
84
84
@@ -90,12 +90,12 @@ To enable Microsoft Entra DS security and DNS audit events using Azure PowerShel
90
90
91
91
* **Azure Log Analytic workspaces** - [Create a Log Analytics workspace with Azure PowerShell](../azure-monitor/logs/powershell-workspace-configuration.md).
92
92
* **Azure storage** - [Create a storage account using Azure PowerShell](../storage/common/storage-account-create.md?tabs=azure-powershell)
93
-
* **Azure event hubs** - [Create an event hub using Azure PowerShell](../event-hubs/event-hubs-quickstart-powershell.md). You may also need to use the [New-AzEventHubAuthorizationRule](/powershell/module/az.eventhub/new-azeventhubauthorizationrule) cmdlet to create an authorization rule that grants Microsoft Entra DS permissions to the event hub *namespace*. The authorization rule must include the **Manage**, **Listen**, and **Send** rights.
93
+
* **Azure event hubs** - [Create an event hub using Azure PowerShell](../event-hubs/event-hubs-quickstart-powershell.md). You may also need to use the [New-AzEventHubAuthorizationRule](/powershell/module/az.eventhub/new-azeventhubauthorizationrule) cmdlet to create an authorization rule that grants Domain Services permissions to the event hub *namespace*. The authorization rule must include the **Manage**, **Listen**, and **Send** rights.
94
94
95
95
> [!IMPORTANT]
96
96
> Ensure you set the authorization rule on the event hub namespace and not the event hub itself.
97
97
98
-
1. Get the resource ID for your Microsoft Entra DS managed domain using the [Get-AzResource](/powershell/module/Az.Resources/Get-AzResource) cmdlet. Create a variable named *$aadds.ResourceId* to hold the value:
98
+
1. Get the resource ID for your Domain Services managed domain using the [Get-AzResource](/powershell/module/Az.Resources/Get-AzResource) cmdlet. Create a variable named *$aadds.ResourceId* to hold the value:
99
99
100
100
```azurepowershell
101
101
$aadds = Get-AzResource -name aaddsDomainName
@@ -138,7 +138,7 @@ Log Analytic workspaces let you view and analyze the security and DNS audit even
138
138
* [Get started with log queries in Azure Monitor](../azure-monitor/logs/get-started-queries.md)
139
139
* [Create and share dashboards of Log Analytics data](../azure-monitor/visualize/tutorial-logs-dashboards.md)
140
140
141
-
The following sample queries can be used to start analyzing audit events from Microsoft Entra DS.
141
+
The following sample queries can be used to start analyzing audit events from Domain Services.
142
142
143
143
### Sample query 1
144
144
@@ -206,7 +206,7 @@ AADDomainServicesAccountLogon
206
206
207
207
## Audit security and DNS event categories
208
208
209
-
Microsoft Entra DS security and DNS audits align with traditional auditing for traditional AD DS domain controllers. In hybrid environments, you can reuse existing audit patterns so the same logic may be used when analyzing the events. Depending on the scenario you need to troubleshoot or analyze, the different audit event categories need to be targeted.
209
+
Domain Services security and DNS audits align with traditional auditing for traditional AD DS domain controllers. In hybrid environments, you can reuse existing audit patterns so the same logic may be used when analyzing the events. Depending on the scenario you need to troubleshoot or analyze, the different audit event categories need to be targeted.
210
210
211
211
The following audit event categories are available:
212
212
@@ -226,7 +226,7 @@ The following audit event categories are available:
226
226
227
227
## Event IDs per category
228
228
229
-
Microsoft Entra DS security and DNS audits record the following event IDs when the specific action triggers an auditable event:
229
+
Domain Services security and DNS audits record the following event IDs when the specific action triggers an auditable event:
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/suspension.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Suspended domains in Microsoft Entra Domain Services | Microsoft Docs
3
-
description: Learn about the different health states for a Microsoft Entra DS managed domain and how to restore a suspended domain.
3
+
description: Learn about the different health states for a Microsoft Entra Domain Services managed domain and how to restore a suspended domain.
4
4
services: active-directory-ds
5
5
author: justinha
6
6
manager: amycolannino
@@ -16,7 +16,7 @@ ms.author: justinha
16
16
---
17
17
# Understand the health states and resolve suspended domains in Microsoft Entra Domain Services
18
18
19
-
When Microsoft Entra Domain Services (Microsoft Entra DS) is unable to service a managed domain for a long period of time, it puts the managed domain into a suspended state. If a managed domain remains in a suspended state, it's automatically deleted. To keep your Microsoft Entra DS managed domain healthy and avoid suspension, resolve any alerts as quickly as you can.
19
+
When Microsoft Entra Domain Services is unable to service a managed domain for a long period of time, it puts the managed domain into a suspended state. If a managed domain remains in a suspended state, it's automatically deleted. To keep your Domain Services managed domain healthy and avoid suspension, resolve any alerts as quickly as you can.
20
20
21
21
This article explains why managed domains are suspended, and how to recover a suspended domain.
22
22
@@ -70,7 +70,7 @@ When a managed domain is in the *Needs Attention* state, the Azure platform may
70
70
A managed domain enters the **Suspended** state for one of the following reasons:
71
71
72
72
* One or more critical alerts haven't been resolved in 15 days.
73
-
* Critical alerts can be caused by a misconfiguration that blocks access to resources that are needed by Microsoft Entra DS. For example, the alert [AADDS104: Network Error][alert-nsg] has been unresolved for more than 15 days in the managed domain.
73
+
* Critical alerts can be caused by a misconfiguration that blocks access to resources that are needed by Domain Services. For example, the alert [AADDS104: Network Error][alert-nsg] has been unresolved for more than 15 days in the managed domain.
74
74
* There's a billing issue with the Azure subscription or the Azure subscription has expired.
75
75
76
76
Managed domains are suspended when the Azure platform can't manage, monitor, patch, or back up the domain. A managed domain stays in a *Suspended* state for 15 days. To maintain access to the managed domain, resolve critical alerts immediately.
@@ -87,7 +87,7 @@ The following behavior is experienced when a managed domain is in the *Suspended
87
87
88
88
### How do you know if your managed domain is suspended?
89
89
90
-
You see an [alert][resolve-alerts] on the Microsoft Entra DS Health page in the Microsoft Entra admin center that notes the domain is suspended. The state of the domain also shows *Suspended*.
90
+
You see an [alert][resolve-alerts] on the Domain Services Health page in the Microsoft Entra admin center that notes the domain is suspended. The state of the domain also shows *Suspended*.
91
91
92
92
### Restore a suspended domain
93
93
@@ -111,7 +111,7 @@ If a managed domain stays in the *Suspended* state for 15 days, it's deleted. Th
111
111
When a managed domain enters the *Deleted* state, the following behavior is seen:
112
112
113
113
* All resources and backups for the managed domain are deleted.
114
-
* You can't restore the managed domain. You must create a replacement managed domain to reuse Microsoft Entra DS.
114
+
* You can't restore the managed domain. You must create a replacement managed domain to reuse Domain Services.
115
115
* After it's deleted, you aren't billed for the managed domain.
0 commit comments