Skip to content

Commit 59f4987

Browse files
authored
Update plan-monitoring-and-reporting.md
1 parent 3baf549 commit 59f4987

File tree

1 file changed

+56
-63
lines changed

1 file changed

+56
-63
lines changed

articles/active-directory/reports-monitoring/plan-monitoring-and-reporting.md

Lines changed: 56 additions & 63 deletions
Original file line numberDiff line numberDiff line change
@@ -3,113 +3,106 @@
33
title: Plan reports & monitoring deployment - Azure AD
44
description: Describes how to plan and execute implementation of reporting and monitoring.
55
services: active-directory
6-
author: shlipsey3
7-
manager: amycolannino
6+
author: gargi-sinha
7+
manager: martinco
88
ms.service: active-directory
99
ms.topic: conceptual
1010
ms.workload: identity
1111
ms.subservice: report-monitor
12-
ms.date: 11/01/2022
13-
ms.author: sarahlipsey
12+
ms.date: 12/13/2022
13+
ms.author: gasinh
1414
ms.reviewer: plenzke
1515

16-
# Customer intent: As an Azure AD administrator, I want to monitor logs and report on access to increase security
16+
# Customer intent: For an Azure AD administrator to monitor logs and report on access
1717
ms.collection: M365-identity-device-management
1818
---
1919

20-
# Plan an Azure Active Directory reporting and monitoring deployment
20+
# Azure Active Directory reporting and monitoring deployment dependencies
2121

22-
Your Azure Active Directory (Azure AD) reporting and monitoring solution depends on your legal, security, and operational requirements and your existing environment and processes. This article presents the various design options and guides you to the right deployment strategy.
22+
Your Azure Active Directory (Azure AD) reporting and monitoring solution depends on legal, security, operational requirements, and your environment's processes. Use the following sections to learn about design options and deployment strategy.
2323

24-
### Benefits of Azure AD reporting and monitoring
24+
## Benefits of Azure AD reporting and monitoring
2525

26-
Azure AD reporting provides a comprehensive view and logs of Azure AD activity in your environment, including sign-in events, audit events, and changes to your directory.
26+
Azure AD reporting has a view, and logs, of Azure AD activity in your environment: sign-in and audit events, also changes to your directory.
2727

28-
The provided data enables you to:
28+
Use data output to:
2929

30-
* determine how your apps and services are used.
31-
32-
* detect potential risks affecting the health of your environment.
33-
34-
* troubleshoot issues preventing your users from getting their work done.
35-
36-
* gain insights by seeing audit events of changes to your Azure AD directory.
30+
* determine how apps and services are used
31+
* detect potential risks affecting environment health
32+
* troubleshoot user issues
33+
* obtain insights from audits of changes to your directory
3734

3835
> [!IMPORTANT]
39-
> Azure AD monitoring enables you to route your logs generated by Azure AD reporting to different target systems. You can then either retain it for long-term use or integrate it with third-party Security Information and Event Management (SIEM) tools to gain insights into your environment.
36+
> Use Azure AD monitoring to route Azure AD reporting logs to target systems. Retain the data, or integrate it with third-party security information and event-management (SIEM) tools for more insights.
4037
4138
With Azure AD monitoring, you can route logs to:
4239

43-
* an Azure storage account for archival purposes.
44-
* Azure Monitor logs, formerly known as Azure Log Analytics workspace, where you can analyze the data, create dashboards, and alert on specific events.
45-
* an Azure event hub where you can integrate with your existing SIEM tools such as Splunk, Sumologic, or QRadar.
40+
* an Azure storage account for archival
41+
* Azure Monitor logs, where you can analyze data, create dashboards, and build event alerts
42+
* an Azure event hub to integrate with SIEM tools, such as Splunk, Sumologic, or QRadar
4643

4744
> [!NOTE]
48-
> We recently started using the term Azure Monitor logs instead of Log Analytics. Log data is still stored in a Log Analytics workspace and is still collected and analyzed by the same Log Analytics service. We are updating the terminology to better reflect the role of [logs in Azure Monitor](../../azure-monitor/data-platform.md). See [Azure Monitor terminology changes](../../azure-monitor/terminology.md) for details.
49-
50-
[Learn more about report retention policies](./reference-reports-data-retention.md).
51-
52-
### Licensing and prerequisites for Azure AD reporting and monitoring
53-
54-
You'll need an Azure AD premium license to access the Azure AD sign-in logs.
45+
> The term Azure Monitor logs has replaced Log Analytics. Log data is stored in a Log Analytics workspace and collected and analyzed by the Log Analytics service.
5546
56-
For detailed feature and licensing information in the [Azure Active Directory pricing guide](https://www.microsoft.com/security/business/identity-access-management/azure-ad-pricing).
47+
Learn more about:
5748

58-
To deploy Azure AD monitoring and reporting you'll need a user who is a global administrator or security administrator for the Azure AD tenant.
49+
* [Azure Monitor data platform](../../azure-monitor/data-platform.md)
50+
* [Azure Monitor naming and terminology changes](../../azure-monitor/terminology.md)
51+
* [How long does Azure AD store reporting data?](./reference-reports-data-retention.md)
5952

60-
Depending on the final destination of your log data, you'll need one of the following:
61-
62-
* An Azure storage account that you have ListKeys permissions for. We recommend that you use a general storage account and not a Blob storage account. For storage pricing information, see the [Azure Storage pricing calculator](https://azure.microsoft.com/pricing/calculator/?service=storage).
63-
64-
* An Azure Event Hubs namespace to integrate with third-party SIEM solutions.
65-
66-
* An Azure Log Analytics workspace to send logs to Azure Monitor logs.
67-
68-
## Plan an Azure reporting and monitoring deployment project
53+
### Licensing and prerequisites for Azure AD reporting and monitoring
6954

70-
In this project, you'll define the audiences that will consume and monitor reports, and define your Azure AD monitoring architecture.
55+
* To access the Azure AD sign-in logs, you'll need an Azure AD premium license
56+
* [Azure Active Directory plans and pricing](https://www.microsoft.com/security/business/identity-access-management/azure-ad-pricing)
57+
* Global Administrator or Security Administrator permissions for the Azure AD tenant
58+
* One of the following items:
59+
* An Azure storage account with ListKeys permissions. We recommend general storage, not Blob. See the [pricing calculator](https://azure.microsoft.com/pricing/calculator/?service=storage).
60+
* An Azure Event Hubs namespace to integrate with SIEM solutions
61+
* An Azure Log Analytics workspace to send logs to Azure Monitor logs
7162

72-
### Engage the right stakeholders
63+
## Azure reporting and monitoring deployment project
7364

74-
When technology projects fail, they typically do so due to mismatched expectations on effect, outcomes, and responsibilities. To avoid these pitfalls, [ensure that you're engaging the right stakeholders](../fundamentals/active-directory-deployment-plans.md). Also ensure that stakeholder roles in the project are well understood by documenting the stakeholders and their project input and accountabilities.
65+
Use the following sections to define the users who consume and monitor reports, and your Azure AD monitoring architecture.
7566

76-
### Plan communications
67+
### Engage stakeholders
7768

78-
Communication is critical to the success of any new service. Proactively communicate with your users how their experience will change, when it will change, and how to gain support if they experience issues.
69+
Successful projects align expectations, outcomes, and responsibilities. See, [Azure Active Directory deployment plans](../fundamentals/active-directory-deployment-plans.md). Document and communicate stakeholder roles that require input and accountability.
7970

80-
### Document your current infrastructure and policies
71+
### Communications plan
8172

82-
Your current infrastructure and policies will drive your reporting and monitoring design. Ensure that you know
73+
Tell your users how and when the experience will change. Provide contact information for support.
8374

84-
* What, if any, SIEM tools you're using.
75+
### Document current infrastructure and policies
8576

86-
* Your Azure infrastructure, including existing storage accounts and monitoring being used.
77+
Your current infrastructure and policies affect reporting and monitoring design. Gather and document the following information:
8778

88-
* Your organizational retention policies for logs, including any applicable compliance frameworks required.
79+
* SIEM tools in use
80+
* Azure infrastructure: storage accounts and monitoring in use
81+
* Organizational log retention policies
82+
* Include required compliance frameworks
8983

90-
## Plan an Azure AD reporting and monitoring deployment
84+
## Retention, analytics, insights, and SIEM integration considerations
9185

92-
Reporting and monitoring are used to meet your business requirements, gain insights into usage patterns, and increase your organization's security posture.
86+
Reporting and monitoring help meet business requirements, gain insights into usage patterns, and increases security posture.
9387

94-
### Business use cases
88+
Business use cases:
9589

96-
* Required for solution to meet business needs
90+
* Required to meet business needs
9791
* Nice to have to meet business needs
9892
* Not applicable
9993

100-
|Area |Description |
101-
|-|-|
102-
|Retention| **Log retention of more than 30 days**. ‎Due to legal or business requirements it's required to store audit logs and sign in logs of Azure AD longer than 30 days. |
103-
|Analytics| **The logs need to be searchable**. ‎The stored logs need to be searchable with analytic tools. |
104-
| Operational Insights| **Insights for various teams**. The need to give access for different users to gain operational insights such as application usage, sign in errors, self-service usage, trends, etc. |
105-
| Security Insights| **Insights for various teams**. The need to give access for different users to gain operational insights such as application usage, sign in errors, self service usage, trends, etc. |
106-
| Integration in SIEM systems | **SIEM integration**. ‎The need to integrate and stream Azure AD sign-in logs and audit logs to existing SIEM systems. |
94+
### Considerations
95+
96+
* **Retention** - Log retention: store audit logs and sign in logs of Azure AD longer than 30 days
97+
* **Analytics** - Logs are searchable with analytic tools
98+
* **Operational and security insights** - Provide access to application usage, sign-in errors, self-service usage, trends, etc.
99+
* **SIEM integration** - Integrate and stream Azure AD sign-in logs and audit logs to SIEM systems
107100

108-
### Choose a monitoring solution architecture
101+
### Monitoring solution architecture
109102

110-
With Azure AD monitoring, you can route your Azure AD activity logs to a system that best meets your business needs. You can then retain them for long-term reporting and analysis to gain insights into your environment, and integrate it with SIEM tools.
103+
With Azure AD monitoring, you can route Azure AD activity logs and retain them for long-term reporting and analysis to gain insights into your environment, and integrate it with SIEM tools.
111104

112-
#### Decision flow chart![An image showing what is described in subsequent sections](media/reporting-deployment-plan/deploy-reporting-flow-diagram.png)
105+
Decision flow chart![An image showing what is described in subsequent sections](media/reporting-deployment-plan/deploy-reporting-flow-diagram.png)
113106

114107
#### Archive logs in a storage account
115108

0 commit comments

Comments
 (0)