Skip to content

Commit 5a9ae91

Browse files
authored
Merge pull request #106434 from curtand/fixpics0303
[Azure AD] approvals updates for Azure resources
2 parents 9c57f39 + 5fa3ee0 commit 5a9ae91

13 files changed

+82
-37
lines changed

articles/active-directory/privileged-identity-management/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@
8383
href: pim-resource-roles-configure-role-settings.md
8484
- name: Configure alerts
8585
href: pim-resource-roles-configure-alerts.md
86-
- name: View activity and audit history
86+
- name: View audit history
8787
href: azure-pim-resource-rbac.md
8888
- name: Use custom roles
8989
href: pim-resource-roles-custom-role-policy.md

articles/active-directory/privileged-identity-management/azure-pim-resource-rbac.md

Lines changed: 51 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -1,27 +1,24 @@
11
---
2-
title: View audit report for Azure resource roles in PIM - Azure AD | Microsoft Docs
2+
title: View audit report for Azure resource roles in Privileged Identity Management (PIM) - Azure AD | Microsoft Docs
33
description: View activity and audit history for Azure resource roles in Azure AD Privileged Identity Management (PIM).
44
services: active-directory
55
documentationcenter: ''
66
author: curtand
77
manager: daveba
88
editor: ''
99

10-
ms.assetid:
1110
ms.service: active-directory
12-
ms.devlang: na
1311
ms.topic: article
14-
ms.tgt_pltfrm: na
1512
ms.workload: identity
1613
ms.subservice: pim
1714
ms.date: 01/10/2020
1815
ms.author: curtand
19-
16+
ms.reviewer: shaunliu
2017
ms.collection: M365-identity-device-management
2118
---
2219
# View activity and audit history for Azure resource roles in Privileged Identity Management
2320

24-
With Azure Active Directory (Azure AD) Privileged Identity Management (PIM), you can view activity, activations, and audit history for Azure resources roles within your organization. This includes subscriptions, resource groups, and even virtual machines. Any resource within the Azure portal that leverages the Azure role-based access control (RBAC) functionality can take advantage of the security and lifecycle management capabilities in Privileged Identity Management.
21+
With Azure Active Directory (Azure AD) Privileged Identity Management (PIM), you can view activity, activations, and audit history for Azure resources roles within your organization. This includes subscriptions, resource groups, and even virtual machines. Any resource within the Azure portal that leverages the Azure role-based access control functionality can take advantage of the security and lifecycle management capabilities in Privileged Identity Management.
2522

2623
> [!NOTE]
2724
> If your organization has outsourced management functions to a service provider who uses [Azure delegated resource management](../../lighthouse/concepts/azure-delegated-resource-management.md), role assignments authorized by that service provider won't be shown here.
@@ -32,39 +29,39 @@ To see what actions a specific user took in various resources, you can view the
3229

3330
1. Open **Azure AD Privileged Identity Management**.
3431

35-
1. Click **Azure resources**.
32+
1. Select **Azure resources**.
3633

37-
1. Click the resource you want to view activity and activations for.
34+
1. Select the resource you want to view activity and activations for.
3835

39-
1. Click **Roles** or **Members**.
36+
1. Select **Roles** or **Members**.
4037

41-
1. Click a user.
38+
1. Select a user.
4239

43-
You see a graphical view of the user's actions in Azure resources by date. It also shows the recent role activations over that same time period.
40+
You see an summary of the user's actions in Azure resources by date. It also shows the recent role activations over that same time period.
4441

4542
![User details with resource activity summary and role activations](media/azure-pim-resource-rbac/rbac-user-details.png)
4643

47-
1. Click a specific role activation to see details and corresponding Azure resource activity that occurred while that user was active.
44+
1. Select a specific role activation to see details and corresponding Azure resource activity that occurred while that user was active.
4845

49-
![Role activation selected and activity details displayed by date](media/azure-pim-resource-rbac/rbac-user-resource-activity.png)
46+
[![Role activation selected and activity details](media/azure-pim-resource-rbac/export-membership.png "Role activation selected and activity details")](media/azure-pim-resource-rbac/export-membership.png)
5047

5148
## Export role assignments with children
5249

5350
You may have a compliance requirement where you must provide a complete list of role assignments to auditors. Privileged Identity Management enables you to query role assignments at a specific resource, which includes role assignments for all child resources. Previously, it was difficult for administrators to get a complete list of role assignments for a subscription and they had to export role assignments for each specific resource. Using Privileged Identity Management, you can query for all active and eligible role assignments in a subscription including role assignments for all resource groups and resources.
5451

5552
1. Open **Azure AD Privileged Identity Management**.
5653

57-
1. Click **Azure resources**.
54+
1. Select **Azure resources**.
5855

59-
1. Click the resource you want to export role assignments for, such as a subscription.
56+
1. Select the resource you want to export role assignments for, such as a subscription.
6057

61-
1. Click **Members**.
58+
1. Select **Members**.
6259

63-
1. Click **Export** to open the Export membership pane.
60+
1. Select **Export** to open the Export membership pane.
6461

65-
![Export membership pane to export all members](media/azure-pim-resource-rbac/export-membership.png)
62+
[![Export membership pane to export all members](media/azure-pim-resource-rbac/export-membership.png "Export membership page to export all members")](media/azure-pim-resource-rbac/export-membership.png)
6663

67-
1. Click **Export all members** to export all role assignments in a CSV file.
64+
1. Select **Export all members** to export all role assignments in a CSV file.
6865

6966
![Exported role assignments in CSV file as display in Excel](media/azure-pim-resource-rbac/export-csv.png)
7067

@@ -74,18 +71,19 @@ Resource audit gives you a view of all role activity for a resource.
7471

7572
1. Open **Azure AD Privileged Identity Management**.
7673

77-
1. Click **Azure resources**.
74+
1. Select **Azure resources**.
7875

79-
1. Click the resource you want to view audit history for.
76+
1. Select the resource you want to view audit history for.
8077

81-
1. Click **Resource audit**.
78+
1. Select **Resource audit**.
8279

8380
1. Filter the history using a predefined date or custom range.
8481

85-
![Resource audit list with filters](media/azure-pim-resource-rbac/rbac-resource-audit.png)
82+
[![Resource audit list with filters](media/azure-pim-resource-rbac/rbac-resource-audit.png "Resource audit list with filters")](media/azure-pim-resource-rbac/rbac-resource-audit.png)
8683

8784
1. For **Audit type**, select **Activate (Assigned + Activated)**.
8885

86+
[![Resource audit list filtered by Activate audit type](media/azure-pim-resource-rbac/rbac-audit-activity.png "Resource audit list filtered by Activate")](media/azure-pim-resource-rbac/rbac-audit-activity.png)
8987
![Resource audit list that is filtered by Activate audit type](media/azure-pim-resource-rbac/rbac-audit-activity.png)
9088

9189
1. Under **Action**, click **(activity)** for a user to see that user's activity detail in Azure resources.
@@ -98,19 +96,44 @@ My audit enables you to view your personal role activity.
9896

9997
1. Open **Azure AD Privileged Identity Management**.
10098

101-
1. Click **Azure resources**.
99+
1. Select **Azure resources**.
102100

103-
1. Click the resource you want to view audit history for.
101+
1. Select the resource you want to view audit history for.
104102

105-
1. Click **My audit**.
103+
1. Select **My audit**.
106104

107105
1. Filter the history using a predefined date or custom range.
108106

109-
![Audit list for the current user](media/azure-pim-resource-rbac/my-audit-time.png)
110-
107+
[![Audit list for the current user](media/azure-pim-resource-rbac/my-audit-time.png "Audit list for the current user")](media/azure-pim-resource-rbac/my-audit-time.png)
108+
111109
> [!NOTE]
112110
> Access to audit history requires either a Global Administrator or Privileged Role Administrator role.
113111
112+
## Get reason, approver, and ticket number for approval events
113+
114+
1. Sign in to the [Azure portal](https://aad.portal.azure.com) with Privileged Role administrator role permissions, and open Azure AD.
115+
1. Select **Audit logs**.
116+
1. Use the **Service** filter to display only audit events for the Privileged identity Management service. On the **Audit logs** page, you can:
117+
118+
- See the reason for an audit event in the **Status reason** column.
119+
- See the approver in the **Initiated by (actor)** column for the "add member to role request approved" event.
120+
121+
[![Filter the audit log for the PIM service](media/azure-pim-resource-rbac/filter-audit-logs.png "Filter the audit log for the PIM service")](media/azure-pim-resource-rbac/filter-audit-logs.png)
122+
123+
1. Select an audit log event to see the ticket number on the **Activity** tab of the **Details** pane.
124+
125+
[![Check the ticket number for the audit event](media/azure-pim-resource-rbac/audit-event-ticket-number.png "Check the ticket number for the audit event")](media/azure-pim-resource-rbac/audit-event-ticket-number.png)]
126+
127+
1. You can view the requester (person activating the role) on the **Targets** tab of the **Details** pane for an audit event. There are three target types for Azure resource roles:
128+
129+
- The role (**Type** = Role)
130+
- The requester (**Type** = Other)
131+
- The approver (**Type** = User)
132+
133+
[![Check the target type](media/azure-pim-resource-rbac/audit-event-target-type.png "Check the target type")](media/azure-pim-resource-rbac/audit-event-target-type.png)
134+
135+
Typically, the log event immediately above the approval event is an event for "Add member to role completed" where the **Initiated by (actor)** is the requester. In most cases, you won't need to find the requester in the approval request from an auditing perspective.
136+
114137
## Next steps
115138

116139
- [Assign Azure resource roles in Privileged Identity Management](pim-resource-roles-assign-roles.md)
Loading
Loading
359 KB
Loading
Loading
1.19 KB
Loading
480 Bytes
Loading
Loading
Loading

0 commit comments

Comments
 (0)