Skip to content

Commit 52f478d

Browse files
authored
Merge pull request #216655 from shlipsey3/reports-howto-updates-103122
howto-updates-103122
2 parents ff75f9a + 8e60b75 commit 52f478d

13 files changed

+88
-144
lines changed

articles/active-directory/reports-monitoring/how-to-view-applied-conditional-access-policies.md

Lines changed: 8 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,29 +1,26 @@
11
---
22

33
title: View applied Conditional Access policies in Azure AD sign-in logs
4-
description: Learn how to view Conditional Access policies in Azure AD sign-in logs so that you can assess the impact of those policies.
4+
description: Learn how to view Conditional Access policies in Azure AD sign-in logs so that you can assess the effect of those policies.
55
services: active-directory
6-
documentationcenter: ''
7-
author: MarkusVi
6+
author: shlipsey3
87
manager: amycolannino
9-
editor: ''
10-
118
ms.service: active-directory
129
ms.topic: how-to
1310
ms.workload: identity
1411
ms.subservice: report-monitor
15-
ms.date: 09/14/2022
16-
ms.author: markvi
12+
ms.date: 10/31/2022
13+
ms.author: sarahlipsey
1714
ms.reviewer: besiler
1815

1916
ms.collection: M365-identity-device-management
2017
---
2118

2219
# View applied Conditional Access policies in Azure AD sign-in logs
2320

24-
With Conditional Access policies, you can control how your users get access to the resources of your Azure tenant. As a tenant admin, you need to be able to determine what impact your Conditional Access policies have on sign-ins to your tenant, so that you can take action if necessary.
21+
With Conditional Access policies, you can control how your users get access to the resources of your Azure tenant. As a tenant admin, you need to be able to determine what effect your Conditional Access policies have on sign-ins to your tenant, so that you can take action if necessary.
2522

26-
The sign-in logs in Azure Active Directory (Azure AD) give you the information that you need to assess the impact of your policies. This article explains how to view applied Conditional Access policies in those logs.
23+
The sign-in logs in Azure Active Directory (Azure AD) give you the information that you need to assess the effect of your policies. This article explains how to view applied Conditional Access policies in those logs.
2724

2825
## What you should know
2926

@@ -37,7 +34,7 @@ Some scenarios require you to get an understanding of how your Conditional Acces
3734

3835
- *Helpdesk administrators* who need to look at applied Conditional Access policies to understand if a policy is the root cause of a ticket that a user opened.
3936

40-
- *Tenant administrators* who need to verify that Conditional Access policies have the intended impact on the users of a tenant.
37+
- *Tenant administrators* who need to verify that Conditional Access policies have the intended effect on the users of a tenant.
4138

4239
You can access the sign-in logs by using the Azure portal, Microsoft Graph, and PowerShell.
4340

@@ -102,7 +99,7 @@ To view the sign-in logs, use:
10299

103100
`Get-MgAuditLogSignIn`
104101

105-
For more information about this cmdlet, see [Get-MgAuditLogSignIn](https://learn.microsoft.com/powershell/module/microsoft.graph.reports/get-mgauditlogsignin?view=graph-powershell-1.0).
102+
For more information about this cmdlet, see [Get-MgAuditLogSignIn](/powershell/module/microsoft.graph.reports/get-mgauditlogsignin).
106103

107104
The Azure AD Graph PowerShell module doesn't support viewing applied Conditional Access policies. Only the Microsoft Graph PowerShell module returns applied Conditional Access policies.
108105

articles/active-directory/reports-monitoring/howto-access-activity-logs.md

Lines changed: 3 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -2,19 +2,14 @@
22
title: Access activity logs in Azure AD | Microsoft Docs
33
description: Learn how to choose the right method for accessing the activity logs in Azure AD.
44
services: active-directory
5-
documentationcenter: ''
6-
author: MarkusVi
5+
author: shlipsey3
76
manager: amycolannino
8-
editor: ''
9-
10-
ms.assetid: ada19f69-665c-452a-8452-701029bf4252
117
ms.service: active-directory
128
ms.topic: how-to
13-
ms.tgt_pltfrm: na
149
ms.workload: identity
1510
ms.subservice: report-monitor
16-
ms.date: 08/26/2022
17-
ms.author: markvi
11+
ms.date: 10/31/2022
12+
ms.author: sarahlipsey
1813
ms.reviewer: besiler
1914

2015
ms.collection: M365-identity-device-management

articles/active-directory/reports-monitoring/howto-analyze-activity-logs-log-analytics.md

Lines changed: 8 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -2,19 +2,14 @@
22
title: Analyze activity logs using Azure Monitor logs | Microsoft Docs
33
description: Learn how to analyze Azure Active Directory activity logs using Azure Monitor logs
44
services: active-directory
5-
documentationcenter: ''
6-
author: MarkusVi
5+
author: shlipsey3
76
manager: amycolannino
8-
editor: ''
9-
10-
ms.assetid: 4535ae65-8591-41ba-9a7d-b7f00c574426
117
ms.service: active-directory
128
ms.topic: how-to
13-
ms.tgt_pltfrm: na
149
ms.workload: identity
1510
ms.subservice: report-monitor
16-
ms.date: 08/26/2022
17-
ms.author: markvi
11+
ms.date: 10/31/2022
12+
ms.author: sarahlipsey
1813
ms.reviewer: besiler
1914

2015
ms.collection: M365-identity-device-management
@@ -35,7 +30,7 @@ To follow along, you need:
3530
* A [Log Analytics workspace](../../azure-monitor/logs/log-analytics-workspace-overview.md) in your Azure subscription. Learn how to [create a Log Analytics workspace](../../azure-monitor/logs/quick-create-workspace.md).
3631
* First, complete the steps to [route the Azure AD activity logs to your Log Analytics workspace](howto-integrate-activity-logs-with-log-analytics.md).
3732
* [Access](../../azure-monitor/logs/manage-access.md#azure-rbac) to the log analytics workspace
38-
* The following roles in Azure Active Directory (if you are accessing Log Analytics through Azure Active Directory portal)
33+
* The following roles in Azure Active Directory (if you're accessing Log Analytics through Azure Active Directory portal)
3934
- Security Admin
4035
- Security Reader
4136
- Report Reader
@@ -93,15 +88,15 @@ You can also set up alerts on your query. For example, to configure an alert whe
9388

9489
4. Select the **Action Group** that will be alerted when the signal occurs. You can choose to notify your team via email or text message, or you could automate the action using webhooks, Azure functions or logic apps. Learn more about [creating and managing alert groups in the Azure portal](../../azure-monitor/alerts/action-groups.md).
9590

96-
5. Once you have configured the alert, select **Create alert** to enable it.
91+
5. Once you've configured the alert, select **Create alert** to enable it.
9792

9893
## Use pre-built workbooks for Azure AD activity logs
9994

10095
The workbooks provide several reports related to common scenarios involving audit, sign-in, and provisioning events. You can also alert on any of the data provided in the reports, using the steps described in the previous section.
10196

102-
* **Provisioning analysis**: This [workbook](../app-provisioning/application-provisioning-log-analytics.md) shows reports related to auditing provisioning activity, such as the number of new users provisioned and provisioning failures, number of users updated and update failures and the number of users de-provisioned and corresponding failures.
103-
* **Sign-ins Events**: This workbook shows the most relevant reports related to monitoring sign-in activity, such as sign-ins by application, user, device, as well as a summary view tracking the number of sign-ins over time.
104-
* **Conditional access insights**: The Conditional Access insights and reporting [workbook](../conditional-access/howto-conditional-access-insights-reporting.md) enables you to understand the impact of Conditional Access policies in your organization over time.
97+
* **Provisioning analysis**: This [workbook](../app-provisioning/application-provisioning-log-analytics.md) shows reports related to auditing provisioning activity. Activities can include the number of new users provisioned, provisioning failures, number of users updated, update failures, the number of users de-provisioned, and corresponding failures.
98+
* **Sign-ins Events**: This workbook shows the most relevant reports related to monitoring sign-in activity, such as sign-ins by application, user, device, and a summary view tracking the number of sign-ins over time.
99+
* **Conditional access insights**: The Conditional Access insights and reporting [workbook](../conditional-access/howto-conditional-access-insights-reporting.md) enables you to understand the effect of Conditional Access policies in your organization over time.
105100

106101
## Next steps
107102

articles/active-directory/reports-monitoring/howto-configure-prerequisites-for-reporting-api.md

Lines changed: 12 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -2,26 +2,21 @@
22
title: Prerequisites for Azure Active Directory reporting API | Microsoft Docs
33
description: Learn about the prerequisites to access the Azure AD reporting API
44
services: active-directory
5-
documentationcenter: ''
6-
author: MarkusVi
5+
author: shlipsey3
76
manager: amycolannino
8-
editor: ''
9-
10-
ms.assetid: ada19f69-665c-452a-8452-701029bf4252
117
ms.service: active-directory
128
ms.topic: how-to
13-
ms.tgt_pltfrm: na
149
ms.workload: identity
1510
ms.subservice: report-monitor
16-
ms.date: 08/26/2022
17-
ms.author: markvi
11+
ms.date: 10/31/2022
12+
ms.author: sarahlipsey
1813
ms.reviewer: dhanyahk
1914

2015
ms.collection: M365-identity-device-management
2116
---
2217
# Prerequisites to access the Azure Active Directory reporting API
2318

24-
The [Azure Active Directory (Azure AD) reporting APIs](./concept-reporting-api.md) provide you with programmatic access to the data through a set of REST-based APIs. You can call these APIs from a number of programming languages and tools.
19+
The [Azure Active Directory (Azure AD) reporting APIs](./concept-reporting-api.md) provide you with programmatic access to the data through a set of REST-based APIs. You can call these APIs from many programming languages and tools.
2520

2621
The reporting API uses [OAuth](../../api-management/api-management-howto-protect-backend-with-aad.md) to authorize access to the web APIs.
2722

@@ -126,7 +121,7 @@ This section shows you how to get the following settings from your directory:
126121
- Client ID
127122
- Client secret or certificate
128123

129-
You need these values when configuring calls to the reporting API. We recommend using a certificate because it is more secure.
124+
You need these values when configuring calls to the reporting API. We recommend using a certificate because it's more secure.
130125

131126
### Get your domain name
132127

@@ -147,7 +142,7 @@ You need these values when configuring calls to the reporting API. We recommend
147142

148143
**To get your application's client ID:**
149144

150-
1. In the [Azure portal](https://portal.azure.com), on the left navigation pane, click **Azure Active Directory**.
145+
1. In the [Azure portal](https://portal.azure.com), on the left navigation pane, select **Azure Active Directory**.
151146

152147
![Screenshot shows Azure Active Directory selected from the Azure portal menu to get application's client ID.](./media/howto-configure-prerequisites-for-reporting-api/01.png)
153148

@@ -162,13 +157,13 @@ You need these values when configuring calls to the reporting API. We recommend
162157

163158
**To get your application's client secret:**
164159

165-
1. In the [Azure portal](https://portal.azure.com), on the left navigation pane, click **Azure Active Directory**.
160+
1. In the [Azure portal](https://portal.azure.com), on the left navigation pane, select **Azure Active Directory**.
166161

167162
![Screenshot shows Azure Active Directory selected from the Azure portal menu to get application's client secret.](./media/howto-configure-prerequisites-for-reporting-api/01.png)
168163

169164
2. Select your application from the **App Registrations** page.
170165

171-
3. Select **Certificates and Secrets** on the **API Application** page, in the **Client Secrets** section, click **+ New Client Secret**.
166+
3. Select **Certificates and Secrets** on the **API Application** page, in the **Client Secrets** section, select **+ New Client Secret**.
172167

173168
![Screenshot shows the Certificates & secrets page where you can add a client secret.](./media/howto-configure-prerequisites-for-reporting-api/12.png)
174169

@@ -178,7 +173,7 @@ You need these values when configuring calls to the reporting API. We recommend
178173

179174
b. As **Expires**, select **In 2 years**.
180175

181-
c. Click **Save**.
176+
c. Select **Save**.
182177

183178
d. Copy the key value.
184179

@@ -214,15 +209,15 @@ If you run into this error message while trying to access sign-ins using Graph E
214209

215210
![Modify permissions UI](./media/troubleshoot-graph-api/modify-permissions.png)
216211

217-
### Error: Tenant is not B2C or tenant doesn't have premium license
212+
### Error: Tenant isn't B2C or tenant doesn't have premium license
218213

219214
Accessing sign-in reports requires an Azure Active Directory premium 1 (P1) license. If you see this error message while accessing sign-ins, make sure that your tenant is licensed with an Azure AD P1 license.
220215

221-
### Error: The allowed roles does not include User.
216+
### Error: The allowed roles doesn't include User.
222217

223218
Avoid errors trying to access audit logs or sign-in using the API. Make sure your account is part of the **Security Reader** or **Report Reader** role in your Azure Active Directory tenant.
224219

225-
### Error: Application missing AAD 'Read directory data' permission
220+
### Error: Application missing Azure AD 'Read directory data' permission
226221

227222
### Error: Application missing Microsoft Graph API 'Read all audit log data' permission
228223

articles/active-directory/reports-monitoring/howto-download-logs.md

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,17 +3,14 @@
33
title: How to download logs in Azure Active Directory | Microsoft Docs
44
description: Learn how to download activity logs in Azure Active Directory.
55
services: active-directory
6-
documentationcenter: ''
7-
author: MarkusVi
6+
author: shlipsey3
87
manager: amycolannino
9-
editor: ''
10-
118
ms.service: active-directory
129
ms.topic: how-to
1310
ms.workload: identity
1411
ms.subservice: report-monitor
15-
ms.date: 08/26/2022
16-
ms.author: markvi
12+
ms.date: 10/31/2022
13+
ms.author: sarahlipsey
1714
ms.reviewer: besiler
1815

1916
ms.collection: M365-identity-device-management

articles/active-directory/reports-monitoring/howto-find-activity-reports.md

Lines changed: 5 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -3,17 +3,14 @@
33
title: Find user activity reports in Azure portal | Microsoft Docs
44
description: Learn where the Azure Active Directory user activity reports are in the Azure portal.
55
services: active-directory
6-
documentationcenter: ''
7-
author: MarkusVi
6+
author: shlipsey3
87
manager: amycolannino
9-
editor: ''
10-
118
ms.service: active-directory
129
ms.topic: how-to
1310
ms.workload: identity
1411
ms.subservice: report-monitor
15-
ms.date: 08/26/2022
16-
ms.author: markvi
12+
ms.date: 10/31/2022
13+
ms.author: sarahlipsey
1714
ms.reviewer: dhanyahk
1815

1916
ms.collection: M365-identity-device-management
@@ -28,8 +25,7 @@ In this article, you learn how to find Azure Active Directory (Azure AD) user ac
2825
The audit logs report combines several reports around application activities into a single view for context-based reporting. To access the audit logs report:
2926

3027
1. Navigate to the [Azure portal](https://portal.azure.com).
31-
2. Select your directory from the top-right corner, then select the **Azure Active Directory** blade from the left navigation pane.
32-
3. Select **Audit logs** from the **Activity** section of the Azure Active Directory blade.
28+
1. Select **Audit logs** from the **Activity** section of Azure Active Directory.
3329

3430
![Audit logs](./media/howto-find-activity-reports/482.png "Audit logs")
3531

@@ -94,7 +90,7 @@ The **Sign-ins** view includes all user sign-ins, as well as the **Application U
9490
To access the sign-ins report:
9591

9692
1. Navigate to the [Azure portal](https://portal.azure.com).
97-
2. Select your directory from the top-right corner, then select the **Azure Active Directory** blade from the left navigation pane.
93+
2. Select your directory from the top-right corner, then select **Azure Active Directory** from the left navigation pane.
9894
3. Select **Signins** from the **Activity** section of the Azure Active Directory blade.
9995

10096
![Sign-ins view](./media/howto-find-activity-reports/483.png "Sign-ins view")

0 commit comments

Comments
 (0)