|
3 | 3 | title: Plan reports & monitoring deployment - Azure AD
|
4 | 4 | description: Describes how to plan and execute implementation of reporting and monitoring.
|
5 | 5 | services: active-directory
|
6 |
| -author: shlipsey3 |
7 |
| -manager: amycolannino |
| 6 | +author: gargi-sinha |
| 7 | +manager: martinco |
8 | 8 | ms.service: active-directory
|
9 | 9 | ms.topic: conceptual
|
10 | 10 | ms.workload: identity
|
11 | 11 | ms.subservice: report-monitor
|
12 |
| -ms.date: 11/01/2022 |
13 |
| -ms.author: sarahlipsey |
| 12 | +ms.date: 12/13/2022 |
| 13 | +ms.author: gasinh |
14 | 14 | ms.reviewer: plenzke
|
15 | 15 |
|
16 |
| -# Customer intent: As an Azure AD administrator, I want to monitor logs and report on access to increase security |
| 16 | +# Customer intent: For an Azure AD administrator to monitor logs and report on access |
17 | 17 | ms.collection: M365-identity-device-management
|
18 | 18 | ---
|
19 | 19 |
|
20 |
| -# Plan an Azure Active Directory reporting and monitoring deployment |
| 20 | +# Azure Active Directory reporting and monitoring deployment dependencies |
21 | 21 |
|
22 |
| -Your Azure Active Directory (Azure AD) reporting and monitoring solution depends on your legal, security, and operational requirements and your existing environment and processes. This article presents the various design options and guides you to the right deployment strategy. |
| 22 | +Your Azure Active Directory (Azure AD) reporting and monitoring solution depends on legal, security, operational requirements, and your environment's processes. Use the following sections to learn about design options and deployment strategy. |
23 | 23 |
|
24 |
| -### Benefits of Azure AD reporting and monitoring |
| 24 | +## Benefits of Azure AD reporting and monitoring |
25 | 25 |
|
26 |
| -Azure AD reporting provides a comprehensive view and logs of Azure AD activity in your environment, including sign-in events, audit events, and changes to your directory. |
| 26 | +Azure AD reporting has a view, and logs, of Azure AD activity in your environment: sign-in and audit events, also changes to your directory. |
27 | 27 |
|
28 |
| -The provided data enables you to: |
| 28 | +Use data output to: |
29 | 29 |
|
30 |
| -* determine how your apps and services are used. |
31 |
| - |
32 |
| -* detect potential risks affecting the health of your environment. |
33 |
| - |
34 |
| -* troubleshoot issues preventing your users from getting their work done. |
35 |
| - |
36 |
| -* gain insights by seeing audit events of changes to your Azure AD directory. |
| 30 | +* determine how apps and services are used |
| 31 | +* detect potential risks affecting environment health |
| 32 | +* troubleshoot user issues |
| 33 | +* obtain insights from audits of changes to your directory |
37 | 34 |
|
38 | 35 | > [!IMPORTANT]
|
39 |
| -> Azure AD monitoring enables you to route your logs generated by Azure AD reporting to different target systems. You can then either retain it for long-term use or integrate it with third-party Security Information and Event Management (SIEM) tools to gain insights into your environment. |
| 36 | +> Use Azure AD monitoring to route Azure AD reporting logs to target systems. Retain the data, or integrate it with third-party security information and event-management (SIEM) tools for more insights. |
40 | 37 |
|
41 | 38 | With Azure AD monitoring, you can route logs to:
|
42 | 39 |
|
43 |
| -* an Azure storage account for archival purposes. |
44 |
| -* Azure Monitor logs, formerly known as Azure Log Analytics workspace, where you can analyze the data, create dashboards, and alert on specific events. |
45 |
| -* an Azure event hub where you can integrate with your existing SIEM tools such as Splunk, Sumologic, or QRadar. |
| 40 | +* an Azure storage account for archival |
| 41 | +* Azure Monitor logs, where you can analyze data, create dashboards, and build event alerts |
| 42 | +* an Azure event hub to integrate with SIEM tools, such as Splunk, Sumologic, or QRadar |
46 | 43 |
|
47 | 44 | > [!NOTE]
|
48 |
| -> We recently started using the term Azure Monitor logs instead of Log Analytics. Log data is still stored in a Log Analytics workspace and is still collected and analyzed by the same Log Analytics service. We are updating the terminology to better reflect the role of [logs in Azure Monitor](../../azure-monitor/data-platform.md). See [Azure Monitor terminology changes](../../azure-monitor/terminology.md) for details. |
49 |
| -
|
50 |
| -[Learn more about report retention policies](./reference-reports-data-retention.md). |
51 |
| - |
52 |
| -### Licensing and prerequisites for Azure AD reporting and monitoring |
53 |
| - |
54 |
| -You'll need an Azure AD premium license to access the Azure AD sign-in logs. |
| 45 | +> The term Azure Monitor logs has replaced Log Analytics. Log data is stored in a Log Analytics workspace and collected and analyzed by the Log Analytics service. |
55 | 46 |
|
56 |
| -For detailed feature and licensing information in the [Azure Active Directory pricing guide](https://www.microsoft.com/security/business/identity-access-management/azure-ad-pricing). |
| 47 | +Learn more about: |
57 | 48 |
|
58 |
| -To deploy Azure AD monitoring and reporting you'll need a user who is a global administrator or security administrator for the Azure AD tenant. |
| 49 | +* [Azure Monitor data platform](../../azure-monitor/data-platform.md) |
| 50 | +* [Azure Monitor naming and terminology changes](../../azure-monitor/terminology.md) |
| 51 | +* [How long does Azure AD store reporting data?](./reference-reports-data-retention.md) |
59 | 52 |
|
60 |
| -Depending on the final destination of your log data, you'll need one of the following: |
61 |
| - |
62 |
| -* An Azure storage account that you have ListKeys permissions for. We recommend that you use a general storage account and not a Blob storage account. For storage pricing information, see the [Azure Storage pricing calculator](https://azure.microsoft.com/pricing/calculator/?service=storage). |
63 |
| - |
64 |
| -* An Azure Event Hubs namespace to integrate with third-party SIEM solutions. |
65 |
| - |
66 |
| -* An Azure Log Analytics workspace to send logs to Azure Monitor logs. |
67 |
| - |
68 |
| -## Plan an Azure reporting and monitoring deployment project |
| 53 | +### Licensing and prerequisites for Azure AD reporting and monitoring |
69 | 54 |
|
70 |
| -In this project, you'll define the audiences that will consume and monitor reports, and define your Azure AD monitoring architecture. |
| 55 | +* To access the Azure AD sign-in logs, you'll need an Azure AD premium license |
| 56 | + * [Azure Active Directory plans and pricing](https://www.microsoft.com/security/business/identity-access-management/azure-ad-pricing) |
| 57 | +* Global Administrator or Security Administrator permissions for the Azure AD tenant |
| 58 | +* One of the following items: |
| 59 | + * An Azure storage account with ListKeys permissions. We recommend general storage, not Blob. See the [pricing calculator](https://azure.microsoft.com/pricing/calculator/?service=storage). |
| 60 | + * An Azure Event Hubs namespace to integrate with SIEM solutions |
| 61 | + * An Azure Log Analytics workspace to send logs to Azure Monitor logs |
71 | 62 |
|
72 |
| -### Engage the right stakeholders |
| 63 | +## Azure reporting and monitoring deployment project |
73 | 64 |
|
74 |
| -When technology projects fail, they typically do so due to mismatched expectations on effect, outcomes, and responsibilities. To avoid these pitfalls, [ensure that you're engaging the right stakeholders](../fundamentals/active-directory-deployment-plans.md). Also ensure that stakeholder roles in the project are well understood by documenting the stakeholders and their project input and accountabilities. |
| 65 | +Use the following sections to define the users who consume and monitor reports, and your Azure AD monitoring architecture. |
75 | 66 |
|
76 |
| -### Plan communications |
| 67 | +### Engage stakeholders |
77 | 68 |
|
78 |
| -Communication is critical to the success of any new service. Proactively communicate with your users how their experience will change, when it will change, and how to gain support if they experience issues. |
| 69 | +Successful projects align expectations, outcomes, and responsibilities. See, [Azure Active Directory deployment plans](../fundamentals/active-directory-deployment-plans.md). Document and communicate stakeholder roles that require input and accountability. |
79 | 70 |
|
80 |
| -### Document your current infrastructure and policies |
| 71 | +### Communications plan |
81 | 72 |
|
82 |
| -Your current infrastructure and policies will drive your reporting and monitoring design. Ensure that you know |
| 73 | +Tell your users how and when the experience will change. Provide contact information for support. |
83 | 74 |
|
84 |
| -* What, if any, SIEM tools you're using. |
| 75 | +### Document current infrastructure and policies |
85 | 76 |
|
86 |
| -* Your Azure infrastructure, including existing storage accounts and monitoring being used. |
| 77 | +Your current infrastructure and policies affect reporting and monitoring design. Gather and document the following information: |
87 | 78 |
|
88 |
| -* Your organizational retention policies for logs, including any applicable compliance frameworks required. |
| 79 | +* SIEM tools in use |
| 80 | +* Azure infrastructure: storage accounts and monitoring in use |
| 81 | +* Organizational log retention policies |
| 82 | + * Include required compliance frameworks |
89 | 83 |
|
90 |
| -## Plan an Azure AD reporting and monitoring deployment |
| 84 | +## Retention, analytics, insights, and SIEM integration considerations |
91 | 85 |
|
92 |
| -Reporting and monitoring are used to meet your business requirements, gain insights into usage patterns, and increase your organization's security posture. |
| 86 | +Reporting and monitoring help meet business requirements, gain insights into usage patterns, and increases security posture. |
93 | 87 |
|
94 |
| -### Business use cases |
| 88 | +Business use cases: |
95 | 89 |
|
96 |
| -* Required for solution to meet business needs |
| 90 | +* Required to meet business needs |
97 | 91 | * Nice to have to meet business needs
|
98 | 92 | * Not applicable
|
99 | 93 |
|
100 |
| -|Area |Description | |
101 |
| -|-|-| |
102 |
| -|Retention| **Log retention of more than 30 days**. Due to legal or business requirements it's required to store audit logs and sign in logs of Azure AD longer than 30 days. | |
103 |
| -|Analytics| **The logs need to be searchable**. The stored logs need to be searchable with analytic tools. | |
104 |
| -| Operational Insights| **Insights for various teams**. The need to give access for different users to gain operational insights such as application usage, sign in errors, self-service usage, trends, etc. | |
105 |
| -| Security Insights| **Insights for various teams**. The need to give access for different users to gain operational insights such as application usage, sign in errors, self service usage, trends, etc. | |
106 |
| -| Integration in SIEM systems | **SIEM integration**. The need to integrate and stream Azure AD sign-in logs and audit logs to existing SIEM systems. | |
| 94 | +### Considerations |
| 95 | + |
| 96 | +* **Retention** - Log retention: store audit logs and sign in logs of Azure AD longer than 30 days |
| 97 | +* **Analytics** - Logs are searchable with analytic tools |
| 98 | +* **Operational and security insights** - Provide access to application usage, sign-in errors, self-service usage, trends, etc. |
| 99 | +* **SIEM integration** - Integrate and stream Azure AD sign-in logs and audit logs to SIEM systems |
107 | 100 |
|
108 |
| -### Choose a monitoring solution architecture |
| 101 | +### Monitoring solution architecture |
109 | 102 |
|
110 |
| -With Azure AD monitoring, you can route your Azure AD activity logs to a system that best meets your business needs. You can then retain them for long-term reporting and analysis to gain insights into your environment, and integrate it with SIEM tools. |
| 103 | +With Azure AD monitoring, you can route Azure AD activity logs and retain them for long-term reporting and analysis to gain insights into your environment, and integrate it with SIEM tools. |
111 | 104 |
|
112 |
| -#### Decision flow chart |
| 105 | +Decision flow chart |
113 | 106 |
|
114 | 107 | #### Archive logs in a storage account
|
115 | 108 |
|
|
0 commit comments