You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/how-to-view-applied-conditional-access-policies.md
+8-11Lines changed: 8 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,29 +1,26 @@
1
1
---
2
2
3
3
title: View applied Conditional Access policies in Azure AD sign-in logs
4
-
description: Learn how to view Conditional Access policies in Azure AD sign-in logs so that you can assess the impact of those policies.
4
+
description: Learn how to view Conditional Access policies in Azure AD sign-in logs so that you can assess the effect of those policies.
5
5
services: active-directory
6
-
documentationcenter: ''
7
-
author: MarkusVi
6
+
author: shlipsey3
8
7
manager: amycolannino
9
-
editor: ''
10
-
11
8
ms.service: active-directory
12
9
ms.topic: how-to
13
10
ms.workload: identity
14
11
ms.subservice: report-monitor
15
-
ms.date: 09/14/2022
16
-
ms.author: markvi
12
+
ms.date: 10/31/2022
13
+
ms.author: sarahlipsey
17
14
ms.reviewer: besiler
18
15
19
16
ms.collection: M365-identity-device-management
20
17
---
21
18
22
19
# View applied Conditional Access policies in Azure AD sign-in logs
23
20
24
-
With Conditional Access policies, you can control how your users get access to the resources of your Azure tenant. As a tenant admin, you need to be able to determine what impact your Conditional Access policies have on sign-ins to your tenant, so that you can take action if necessary.
21
+
With Conditional Access policies, you can control how your users get access to the resources of your Azure tenant. As a tenant admin, you need to be able to determine what effect your Conditional Access policies have on sign-ins to your tenant, so that you can take action if necessary.
25
22
26
-
The sign-in logs in Azure Active Directory (Azure AD) give you the information that you need to assess the impact of your policies. This article explains how to view applied Conditional Access policies in those logs.
23
+
The sign-in logs in Azure Active Directory (Azure AD) give you the information that you need to assess the effect of your policies. This article explains how to view applied Conditional Access policies in those logs.
27
24
28
25
## What you should know
29
26
@@ -37,7 +34,7 @@ Some scenarios require you to get an understanding of how your Conditional Acces
37
34
38
35
-*Helpdesk administrators* who need to look at applied Conditional Access policies to understand if a policy is the root cause of a ticket that a user opened.
39
36
40
-
-*Tenant administrators* who need to verify that Conditional Access policies have the intended impact on the users of a tenant.
37
+
-*Tenant administrators* who need to verify that Conditional Access policies have the intended effect on the users of a tenant.
41
38
42
39
You can access the sign-in logs by using the Azure portal, Microsoft Graph, and PowerShell.
43
40
@@ -102,7 +99,7 @@ To view the sign-in logs, use:
102
99
103
100
`Get-MgAuditLogSignIn`
104
101
105
-
For more information about this cmdlet, see [Get-MgAuditLogSignIn](https://learn.microsoft.com/powershell/module/microsoft.graph.reports/get-mgauditlogsignin?view=graph-powershell-1.0).
102
+
For more information about this cmdlet, see [Get-MgAuditLogSignIn](/powershell/module/microsoft.graph.reports/get-mgauditlogsignin).
106
103
107
104
The Azure AD Graph PowerShell module doesn't support viewing applied Conditional Access policies. Only the Microsoft Graph PowerShell module returns applied Conditional Access policies.
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/howto-analyze-activity-logs-log-analytics.md
+8-13Lines changed: 8 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,19 +2,14 @@
2
2
title: Analyze activity logs using Azure Monitor logs | Microsoft Docs
3
3
description: Learn how to analyze Azure Active Directory activity logs using Azure Monitor logs
4
4
services: active-directory
5
-
documentationcenter: ''
6
-
author: MarkusVi
5
+
author: shlipsey3
7
6
manager: amycolannino
8
-
editor: ''
9
-
10
-
ms.assetid: 4535ae65-8591-41ba-9a7d-b7f00c574426
11
7
ms.service: active-directory
12
8
ms.topic: how-to
13
-
ms.tgt_pltfrm: na
14
9
ms.workload: identity
15
10
ms.subservice: report-monitor
16
-
ms.date: 08/26/2022
17
-
ms.author: markvi
11
+
ms.date: 10/31/2022
12
+
ms.author: sarahlipsey
18
13
ms.reviewer: besiler
19
14
20
15
ms.collection: M365-identity-device-management
@@ -35,7 +30,7 @@ To follow along, you need:
35
30
* A [Log Analytics workspace](../../azure-monitor/logs/log-analytics-workspace-overview.md) in your Azure subscription. Learn how to [create a Log Analytics workspace](../../azure-monitor/logs/quick-create-workspace.md).
36
31
* First, complete the steps to [route the Azure AD activity logs to your Log Analytics workspace](howto-integrate-activity-logs-with-log-analytics.md).
37
32
*[Access](../../azure-monitor/logs/manage-access.md#azure-rbac) to the log analytics workspace
38
-
* The following roles in Azure Active Directory (if you are accessing Log Analytics through Azure Active Directory portal)
33
+
* The following roles in Azure Active Directory (if you're accessing Log Analytics through Azure Active Directory portal)
39
34
- Security Admin
40
35
- Security Reader
41
36
- Report Reader
@@ -93,15 +88,15 @@ You can also set up alerts on your query. For example, to configure an alert whe
93
88
94
89
4. Select the **Action Group** that will be alerted when the signal occurs. You can choose to notify your team via email or text message, or you could automate the action using webhooks, Azure functions or logic apps. Learn more about [creating and managing alert groups in the Azure portal](../../azure-monitor/alerts/action-groups.md).
95
90
96
-
5. Once you have configured the alert, select **Create alert** to enable it.
91
+
5. Once you've configured the alert, select **Create alert** to enable it.
97
92
98
93
## Use pre-built workbooks for Azure AD activity logs
99
94
100
95
The workbooks provide several reports related to common scenarios involving audit, sign-in, and provisioning events. You can also alert on any of the data provided in the reports, using the steps described in the previous section.
101
96
102
-
***Provisioning analysis**: This [workbook](../app-provisioning/application-provisioning-log-analytics.md) shows reports related to auditing provisioning activity, such as the number of new users provisioned and provisioning failures, number of users updated and update failures and the number of users de-provisioned and corresponding failures.
103
-
***Sign-ins Events**: This workbook shows the most relevant reports related to monitoring sign-in activity, such as sign-ins by application, user, device, as well as a summary view tracking the number of sign-ins over time.
104
-
***Conditional access insights**: The Conditional Access insights and reporting [workbook](../conditional-access/howto-conditional-access-insights-reporting.md) enables you to understand the impact of Conditional Access policies in your organization over time.
97
+
***Provisioning analysis**: This [workbook](../app-provisioning/application-provisioning-log-analytics.md) shows reports related to auditing provisioning activity. Activities can include the number of new users provisioned, provisioning failures, number of users updated, update failures, the number of users de-provisioned, and corresponding failures.
98
+
***Sign-ins Events**: This workbook shows the most relevant reports related to monitoring sign-in activity, such as sign-ins by application, user, device, and a summary view tracking the number of sign-ins over time.
99
+
***Conditional access insights**: The Conditional Access insights and reporting [workbook](../conditional-access/howto-conditional-access-insights-reporting.md) enables you to understand the effect of Conditional Access policies in your organization over time.
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/howto-configure-prerequisites-for-reporting-api.md
+12-17Lines changed: 12 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,26 +2,21 @@
2
2
title: Prerequisites for Azure Active Directory reporting API | Microsoft Docs
3
3
description: Learn about the prerequisites to access the Azure AD reporting API
4
4
services: active-directory
5
-
documentationcenter: ''
6
-
author: MarkusVi
5
+
author: shlipsey3
7
6
manager: amycolannino
8
-
editor: ''
9
-
10
-
ms.assetid: ada19f69-665c-452a-8452-701029bf4252
11
7
ms.service: active-directory
12
8
ms.topic: how-to
13
-
ms.tgt_pltfrm: na
14
9
ms.workload: identity
15
10
ms.subservice: report-monitor
16
-
ms.date: 08/26/2022
17
-
ms.author: markvi
11
+
ms.date: 10/31/2022
12
+
ms.author: sarahlipsey
18
13
ms.reviewer: dhanyahk
19
14
20
15
ms.collection: M365-identity-device-management
21
16
---
22
17
# Prerequisites to access the Azure Active Directory reporting API
23
18
24
-
The [Azure Active Directory (Azure AD) reporting APIs](./concept-reporting-api.md) provide you with programmatic access to the data through a set of REST-based APIs. You can call these APIs from a number of programming languages and tools.
19
+
The [Azure Active Directory (Azure AD) reporting APIs](./concept-reporting-api.md) provide you with programmatic access to the data through a set of REST-based APIs. You can call these APIs from many programming languages and tools.
25
20
26
21
The reporting API uses [OAuth](../../api-management/api-management-howto-protect-backend-with-aad.md) to authorize access to the web APIs.
27
22
@@ -126,7 +121,7 @@ This section shows you how to get the following settings from your directory:
126
121
- Client ID
127
122
- Client secret or certificate
128
123
129
-
You need these values when configuring calls to the reporting API. We recommend using a certificate because it is more secure.
124
+
You need these values when configuring calls to the reporting API. We recommend using a certificate because it's more secure.
130
125
131
126
### Get your domain name
132
127
@@ -147,7 +142,7 @@ You need these values when configuring calls to the reporting API. We recommend
147
142
148
143
**To get your application's client ID:**
149
144
150
-
1. In the [Azure portal](https://portal.azure.com), on the left navigation pane, click**Azure Active Directory**.
145
+
1. In the [Azure portal](https://portal.azure.com), on the left navigation pane, select**Azure Active Directory**.
151
146
152
147

153
148
@@ -162,13 +157,13 @@ You need these values when configuring calls to the reporting API. We recommend
162
157
163
158
**To get your application's client secret:**
164
159
165
-
1. In the [Azure portal](https://portal.azure.com), on the left navigation pane, click**Azure Active Directory**.
160
+
1. In the [Azure portal](https://portal.azure.com), on the left navigation pane, select**Azure Active Directory**.
166
161
167
162

168
163
169
164
2. Select your application from the **App Registrations** page.
170
165
171
-
3. Select **Certificates and Secrets** on the **API Application** page, in the **Client Secrets** section, click**+ New Client Secret**.
166
+
3. Select **Certificates and Secrets** on the **API Application** page, in the **Client Secrets** section, select**+ New Client Secret**.
172
167
173
168

174
169
@@ -178,7 +173,7 @@ You need these values when configuring calls to the reporting API. We recommend
178
173
179
174
b. As **Expires**, select **In 2 years**.
180
175
181
-
c. Click**Save**.
176
+
c. Select**Save**.
182
177
183
178
d. Copy the key value.
184
179
@@ -214,15 +209,15 @@ If you run into this error message while trying to access sign-ins using Graph E
### Error: Tenant is not B2C or tenant doesn't have premium license
212
+
### Error: Tenant isn't B2C or tenant doesn't have premium license
218
213
219
214
Accessing sign-in reports requires an Azure Active Directory premium 1 (P1) license. If you see this error message while accessing sign-ins, make sure that your tenant is licensed with an Azure AD P1 license.
220
215
221
-
### Error: The allowed roles does not include User.
216
+
### Error: The allowed roles doesn't include User.
222
217
223
218
Avoid errors trying to access audit logs or sign-in using the API. Make sure your account is part of the **Security Reader** or **Report Reader** role in your Azure Active Directory tenant.
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/howto-find-activity-reports.md
+5-9Lines changed: 5 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,17 +3,14 @@
3
3
title: Find user activity reports in Azure portal | Microsoft Docs
4
4
description: Learn where the Azure Active Directory user activity reports are in the Azure portal.
5
5
services: active-directory
6
-
documentationcenter: ''
7
-
author: MarkusVi
6
+
author: shlipsey3
8
7
manager: amycolannino
9
-
editor: ''
10
-
11
8
ms.service: active-directory
12
9
ms.topic: how-to
13
10
ms.workload: identity
14
11
ms.subservice: report-monitor
15
-
ms.date: 08/26/2022
16
-
ms.author: markvi
12
+
ms.date: 10/31/2022
13
+
ms.author: sarahlipsey
17
14
ms.reviewer: dhanyahk
18
15
19
16
ms.collection: M365-identity-device-management
@@ -28,8 +25,7 @@ In this article, you learn how to find Azure Active Directory (Azure AD) user ac
28
25
The audit logs report combines several reports around application activities into a single view for context-based reporting. To access the audit logs report:
29
26
30
27
1. Navigate to the [Azure portal](https://portal.azure.com).
31
-
2. Select your directory from the top-right corner, then select the **Azure Active Directory** blade from the left navigation pane.
32
-
3. Select **Audit logs** from the **Activity** section of the Azure Active Directory blade.
28
+
1. Select **Audit logs** from the **Activity** section of Azure Active Directory.
0 commit comments