Skip to content

Commit 50efc7c

Browse files
committed
reports-bulk-updates-082223
1 parent a74f08d commit 50efc7c

17 files changed

+66
-105
lines changed

articles/active-directory/includes/diagnostic-settings-include.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.custom: include file
1313

1414
1. Sign in to the [Azure portal](https://portal.azure.com) as a **Security Administrator**.
1515

16-
1. Go to **Azure Active Directory** > **Diagnostic settings**. You can also select **Export Settings** from either the **Audit Logs** or **Sign-ins** page.
16+
1. Browse to **Azure Active Directory** > **Monitoring** > **Diagnostic settings**. You can also select **Export Settings** from either the **Audit Logs** or **Sign-ins** page.
1717

1818
1. Select **+ Add diagnostic setting** to create a new integration or select **Edit setting** for an existing integration.
1919

articles/active-directory/reports-monitoring/concept-audit-logs.md

Lines changed: 13 additions & 45 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22

3-
title: Audit logs in Azure Active Directory
4-
description: Overview of the audit logs in Azure Active Directory.
3+
title: Learn about the audit logs in Azure Active Directory
4+
description: Overview of the audit logs available in Azure Active Directory.
55
services: active-directory
66
author: shlipsey3
77
manager: amycolannino
@@ -12,8 +12,9 @@ ms.subservice: report-monitor
1212
ms.date: 11/04/2022
1313
ms.author: sarahlipsey
1414
ms.reviewer: besiler
15-
ms.collection: M365-identity-device-management
15+
1616
---
17+
1718
# Audit logs in Azure Active Directory
1819

1920
Azure Active Directory (Azure AD) activity logs include audit logs, which is a comprehensive report on every logged event in Azure AD. Changes to applications, groups, users, and licenses are all captured in the Azure AD audit logs.
@@ -25,59 +26,28 @@ Two other activity logs are also available to help monitor the health of your te
2526

2627
This article gives you an overview of the audit logs.
2728

28-
## What is it?
29-
30-
Audit logs in Azure AD provide access to system activity records, often needed for compliance. This log is categorized by user, group, and application management.
29+
## What can you do with audit logs?
3130

32-
With a user-centric view, you can get answers to questions such as:
31+
Audit logs in Azure AD provide access to system activity records, often needed for compliance. You can get answers to questions related to users, groups, and applications.
3332

34-
- What types of updates have been applied to users?
33+
**Users:**
3534

35+
- What types of changes were recently applied to users?
3636
- How many users were changed?
37-
3837
- How many passwords were changed?
3938

40-
- What has an administrator done in a directory?
41-
42-
43-
With a group-centric view, you can get answers to questions such as:
44-
45-
- What are the groups that have been added?
46-
47-
- Are there groups with membership changes?
39+
**Groups:**
4840

41+
- What groups were recently added?
4942
- Have the owners of group been changed?
50-
5143
- What licenses have been assigned to a group or a user?
5244

45+
**Applications:**
5346

54-
With an application-centric view, you can get answers to questions such as:
55-
56-
- What applications have been added or updated?
57-
58-
- What applications have been removed?
59-
47+
- What applications have been added, updated, or removed?
6048
- Has a service principal for an application changed?
61-
6249
- Have the names of applications been changed?
63-
64-
- Who gave consent to an application?
65-
6650

67-
## How do I access it?
68-
69-
To access the audit log for a tenant, you must have one of the following roles:
70-
71-
- Reports Reader
72-
- Security Reader
73-
- Security Administrator
74-
- Global Reader
75-
- Global Administrator
76-
77-
Sign in to the [Azure portal](https://portal.azure.com) and go to **Azure AD** and select **Audit log** from the **Monitoring** section.
78-
79-
The audit activity report is available in [all editions of Azure AD](reference-reports-data-retention.md#how-long-does-azure-ad-store-the-data). If you have an Azure Active Directory P1 or P2 license, you can access the audit log through the [Microsoft Graph API](/graph/api/resources/azure-ad-auditlog-overview). See [Getting started with Azure Active Directory Premium](../fundamentals/get-started-premium.md) to upgrade your Azure Active Directory edition. It will take a couple of days for the data to show up in Graph after you upgrade to a premium license with no data activities before the upgrade.
80-
8151
## What do the logs show?
8252

8353
Audit logs have a default list view that shows:
@@ -87,12 +57,10 @@ Audit logs have a default list view that shows:
8757
- Category and name of the activity (*what*)
8858
- Status of the activity (success or failure)
8959
- Target
90-
- Initiator / actor of an activity (who)
60+
- Initiator / actor of an activity (*who*)
9161

9262
You can customize and filter the list view by clicking the **Columns** button in the toolbar. Editing the columns enables you to add or remove fields from your view.
9363

94-
![Screenshot of available fields.](./media/concept-audit-logs/columnselect.png "Remove fields")
95-
9664
### Filtering audit logs
9765

9866
You can filter the audit data using the options visible in your list such as date range, service, category, and activity.

articles/active-directory/reports-monitoring/concept-provisioning-logs.md

Lines changed: 11 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,16 @@
11
---
22
title: Provisioning logs in Azure Active Directory
3-
description: Overview of the provisioning logs in Azure Active Directory.
3+
description: Learn about the information included in the provisioning logs in Azure Active Directory.
44
services: active-directory
55
author: shlipsey3
66
manager: amycolannino
77
ms.service: active-directory
88
ms.topic: conceptual
99
ms.workload: identity
1010
ms.subservice: report-monitor
11-
ms.date: 06/16/2023
11+
ms.date: 08/22/2023
1212
ms.author: sarahlipsey
1313
ms.reviewer: arvinh
14-
ms.collection: M365-identity-device-management
1514
---
1615
# Provisioning logs in Azure Active Directory
1716

@@ -50,15 +49,18 @@ Application owners can view logs for their own applications. The following roles
5049
- Global Administrator
5150
- Users in a custom role with the [provisioningLogs permission](../roles/custom-enterprise-app-permissions.md#full-list-of-permissions)
5251

53-
To access the provisioning log data, you have the following options:
52+
There are several ways to view or analyze the Provisioning logs:
5453

55-
- Select **Provisioning logs** from the **Monitoring** section of Azure AD.
54+
- View in the Azure portal.
55+
- Stream logs to [Azure Monitor](../app-provisioning/application-provisioning-log-analytics.md) through Diagnostic settings.
56+
- Analyze logs through [Workbook](howto-use-workbooks.md) templates.
57+
- Access logs programmatically through the [Microsoft Graph API](/graph/api/resources/provisioningobjectsummary).
58+
- [Download the logs](howto-download-logs.md) as a CSV or JSON file.
5659

57-
- Stream the provisioning logs into [Azure Monitor](../app-provisioning/application-provisioning-log-analytics.md). This method allows for extended data retention and building custom dashboards, alerts, and queries.
60+
To access the logs in the Azure portal:
5861

59-
- Query the [Microsoft Graph API](/graph/api/resources/provisioningobjectsummary) for the provisioning logs.
60-
61-
- Download the provisioning logs as a CSV or JSON file.
62+
1. Sign in to the [Azure portal](https://portal.azure.com) using the Reports Reader role.
63+
1. Browse to **Azure Active Directory** > **Monitoring** > **Provisioning logs**.
6264

6365
## View the provisioning logs
6466

articles/active-directory/reports-monitoring/concept-usage-insights-report.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.topic: conceptual
99
ms.workload: identity
1010
ms.subservice: report-monitor
11-
ms.date: 05/30/2023
11+
ms.date: 08/22/2023
1212
ms.author: sarahlipsey
1313
ms.reviewer: madansr7
1414
---
@@ -37,7 +37,7 @@ You can access the Usage and insights reports from the Azure portal and using Mi
3737
### To access Usage & insights in the portal:
3838

3939
1. Sign in to the [Azure portal](https://portal.azure.com) using the appropriate least privileged role.
40-
1. Go to **Azure Active Directory** > **Usage & insights**.
40+
1. Browse to **Azure Active Directory** > **Monitoring** > **Usage & insights**.
4141

4242
The **Usage & insights** reports are also available from the **Enterprise applications** area of Azure AD. All users can access their own sign-ins at the [My Sign-Ins portal](https://mysignins.microsoft.com/security-info).
4343

articles/active-directory/reports-monitoring/how-to-view-applied-conditional-access-policies.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,11 +9,10 @@ ms.service: active-directory
99
ms.topic: how-to
1010
ms.workload: identity
1111
ms.subservice: report-monitor
12-
ms.date: 02/03/2023
12+
ms.date: 08/22/2023
1313
ms.author: sarahlipsey
1414
ms.reviewer: besiler
1515

16-
ms.collection: M365-identity-device-management
1716
---
1817

1918
# View applied Conditional Access policies in Azure AD sign-in logs
@@ -92,8 +91,8 @@ The Azure AD Graph PowerShell module doesn't support viewing applied Conditional
9291
The activity details of sign-in logs contain several tabs. The **Conditional Access** tab lists the Conditional Access policies applied to that sign-in event.
9392

9493
1. Sign in to the [Azure portal](https://portal.azure.com) using the Security Reader role.
95-
1. In the**Monitoring**section, select**Sign-in logs**.
96-
1. Select a sign-in item from the table to open the **Activity Details: Sign-ins context** pane.
94+
1. Browse to **Azure Active Directory** >**Monitoring**>**Sign-in logs**.
95+
1. Select a sign-in item from the table to view the sign-in details pane.
9796
1. Select the **Conditional Access** tab.
9897

9998
If you don't see the Conditional Access policies, confirm you're using a role that provides access to both the sign-in logs and the Conditional Access policies.

articles/active-directory/reports-monitoring/howto-access-activity-logs.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ The SIEM tools you can integrate with your event hub can provide analysis and mo
6161

6262
1. Sign in to the [Azure portal](https://portal.azure.com) using one of the required roles.
6363
1. Create an Event Hubs namespace and event hub.
64-
1. Go to **Azure AD** > **Diagnostic settings**.
64+
1. Browse to **Azure AD** > **Monitoring** > **Diagnostic settings**.
6565
1. Choose the logs you want to stream, select the **Stream to an event hub** option, and complete the fields.
6666
- [Set up an Event Hubs namespace and an event hub](../../event-hubs/event-hubs-create.md)
6767
- [Learn more about streaming activity logs to an event hub](tutorial-azure-monitor-stream-logs-to-event-hub.md)
@@ -105,7 +105,7 @@ Integrating Azure AD logs with Azure Monitor logs provides a centralized locatio
105105

106106
1. Sign in to the [Azure portal](https://portal.azure.com) using one of the required roles.
107107
1. [Create a Log Analytics workspace](../../azure-monitor/logs/quick-create-workspace.md).
108-
1. Go to **Azure AD** > **Diagnostic settings**.
108+
1. Browse to **Azure AD** > **Monitoring** > **Diagnostic settings**.
109109
1. Choose the logs you want to stream, select the **Send to Log Analytics workspace** option, and complete the fields.
110110
1. Go to **Azure AD** > **Log Analytics** and begin querying the data.
111111
- [Integrate Azure AD logs with Azure Monitor logs](howto-integrate-activity-logs-with-log-analytics.md)
@@ -154,22 +154,22 @@ The reports available in the Azure portal provide a wide range of capabilities t
154154
Use the following basic steps to access the reports in the Azure portal.
155155
#### Azure AD activity logs
156156

157-
1. Go to **Azure AD** and select **Audit logs**, **Sign-in logs**, or **Provisioning logs** from the **Monitoring** menu.
157+
1. Browse to **Azure AD** > **Monitoring** > **Audit logs**/**Sign-in logs**/**Provisioning logs**.
158158
1. Adjust the filter according to your needs.
159159
- [Learn how to filter activity logs](quickstart-filter-audit-log.md)
160160
- [Explore the Azure AD audit log categories and activities](reference-audit-activities.md)
161161
- [Learn about basic info in the Azure AD sign-in logs](reference-basic-info-sign-in-logs.md)
162162

163163
#### Azure AD Identity Protection reports
164164

165-
1. Go to **Azure AD** > **Security** > **Identity Protection**.
165+
1. Browse to **Azure AD** > **Security** > **Identity Protection**.
166166
1. Explore the available reports.
167167
- [Learn more about Identity Protection](../identity-protection/overview-identity-protection.md)
168168
- [Learn how to investigate risk](../identity-protection/howto-identity-protection-investigate-risk.md)
169169

170170
#### Usage and insights reports
171171

172-
1. Go to **Azure AD** and select **Usage and insights** from the **Monitoring** menu.
172+
1. Browse to **Azure AD** > **Monitoring** > **Usage and insights**.
173173
1. Explore the available reports.
174174
- [Learn more about the Usage and insights report](concept-usage-insights-report.md)
175175

@@ -203,14 +203,14 @@ Use the following basic steps to archive or download your activity logs.
203203

204204
1. Sign in to the [Azure portal](https://portal.azure.com) using one of the required roles.
205205
1. Create a storage account.
206-
1. Go to **Azure AD** > **Diagnostic settings**.
206+
1. Browse to **Azure AD** > **Monitoring** > **Diagnostic settings**.
207207
1. Choose the logs you want to stream, select the **Archive to a storage account** option, and complete the fields.
208208
- [Review the data retention policies](reference-reports-data-retention.md)
209209

210210
#### Manually download activity logs
211211

212212
1. Sign in to the [Azure portal](https://portal.azure.com) using one of the required roles.
213-
1. Go to **Azure AD** and select **Audit logs**, **Sign-in logs**, or **Provisioning logs** from the **Monitoring** menu.
213+
1. Browse to **Azure AD** > **Monitoring** > **Audit logs**/**Sign-in logs**/**Provisioning logs** from the **Monitoring** menu.
214214
1. Select **Download**.
215215
- [Learn more about how to download logs](howto-download-logs.md).
216216

articles/active-directory/reports-monitoring/howto-analyze-activity-logs-log-analytics.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,11 +8,9 @@ ms.service: active-directory
88
ms.topic: how-to
99
ms.workload: identity
1010
ms.subservice: report-monitor
11-
ms.date: 06/26/2023
11+
ms.date: 08/22/2023
1212
ms.author: sarahlipsey
1313
ms.reviewer: besiler
14-
15-
ms.collection: M365-identity-device-management
1614
---
1715

1816
# Analyze Azure AD activity logs with Log Analytics
@@ -45,9 +43,9 @@ To view the Azure AD Log Analytics, you must already be sending your activity lo
4543

4644
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
4745

48-
1. Sign in to the [Azure portal](https://portal.azure.com).
46+
1. Sign in to the [Azure portal](https://portal.azure.com) using the appropriate least privilege role.
4947

50-
1. Go to **Azure Active Directory** > **Log Analytics**. A default search query runs.
48+
1. Browse to **Azure Active Directory** > **Monitoring** > **Log Analytics**. A default search query runs.
5149

5250
![Default query](./media/howto-analyze-activity-logs-log-analytics/defaultquery.png)
5351

articles/active-directory/reports-monitoring/howto-archive-logs-to-storage-account.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.topic: how-to
99
ms.workload: identity
1010
ms.subservice: report-monitor
11-
ms.date: 08/09/2023
11+
ms.date: 08/22/2023
1212
ms.author: sarahlipsey
1313
ms.reviewer: besiler
1414

articles/active-directory/reports-monitoring/howto-configure-prerequisites-for-reporting-api.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -43,9 +43,9 @@ To enable your application to access Microsoft Graph without user intervention,
4343

4444
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
4545

46-
1. Sign in to the [Azure portal](https://portal.azure.com).
46+
1. Sign in to the [Azure portal](https://portal.azure.com) using the appropriate least privilege role.
4747

48-
1. Go to **Azure Active Directory** > **App registrations**.
48+
1. Browse to **Azure Active Directory** > **App registrations**.
4949

5050
1. Select **New registration**.
5151

@@ -63,7 +63,7 @@ To enable your application to access Microsoft Graph without user intervention,
6363

6464
To access the Azure AD reporting API, you must grant your app *Read directory data* and *Read all audit log data* permissions for the Microsoft Graph API.
6565

66-
1. **Azure Active Directory** > **App Registrations**> **API permissions** and select **Add a permission**.
66+
1. Browse to **Azure Active Directory** > **App Registrations**> **API permissions** and select **Add a permission**.
6767

6868
![Screenshot of the API permissions menu option and Add permissions button.](./media/howto-configure-prerequisites-for-reporting-api/api-permissions-new-permission.png)
6969

@@ -100,7 +100,7 @@ To use PowerShell to access the Azure AD reporting API, you'll need to gather a
100100

101101
You need these values when configuring calls to the reporting API. We recommend using a certificate because it's more secure.
102102

103-
1. Go to **Azure Active Directory** > **App Registrations**.
103+
1. Browse to **Azure Active Directory** > **App Registrations**.
104104
1. Copy the **Directory (tenant) ID**.
105105
1. Copy the **Application (client) ID**.
106106
1. Go to **App Registration** > Select your application > **Certificates & secrets** > **Certificates** > **Upload certificate** and upload your certificate's public key file.

articles/active-directory/reports-monitoring/howto-customize-filter-logs.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.topic: conceptual
99
ms.workload: identity
1010
ms.subservice: report-monitor
11-
ms.date: 08/18/2023
11+
ms.date: 08/22/2023
1212
ms.author: sarahlipsey
1313
ms.reviewer: besiler
1414
---
@@ -38,8 +38,7 @@ You can always access your own sign-in history at [https://mysignins.microsoft.c
3838

3939

4040
1. Sign in to the [Azure portal](https://portal.azure.com) using the appropriate least privileged role.
41-
1. Go to **Azure Active Directory** > **Monitoring and health**.
42-
1. Select the logs from the side menu.
41+
1. Browse to **Azure Active Directory** > **Monitoring** > **Audit logs**/**Sign-in logs**/**Provisioning logs**.
4342

4443
## Audit logs
4544

0 commit comments

Comments
 (0)