Skip to content

Commit 673ef41

Browse files
committed
fine-tuning
1 parent e796c13 commit 673ef41

File tree

2 files changed

+25
-35
lines changed

2 files changed

+25
-35
lines changed

articles/active-directory/reports-monitoring/concept-activity-logs-azure-monitor.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,14 +8,14 @@ ms.service: active-directory
88
ms.topic: conceptual
99
ms.workload: identity
1010
ms.subservice: report-monitor
11-
ms.date: 07/26/2023
11+
ms.date: 07/27/2023
1212
ms.author: sarahlipsey
1313
ms.reviewer: besiler
1414
ms.collection: M365-identity-device-management
1515
---
1616
# Azure AD activity log integrations
1717

18-
Using **Diagnostic settings** in Azure Active Directory (Azure AD), you can route activity logs to several endpoints for long term retention and data insights. You can archive logs for storage, route to Security Information and Event Management (SIEM) tools, and integrate logs with Azure Monitor logs.
18+
Using **Diagnostic settings** in Azure Active Directory (Azure AD), you can route activity logs to several endpoints for long term data retention and insights. You can archive logs for storage, route to Security Information and Event Management (SIEM) tools, and integrate logs with Azure Monitor logs.
1919

2020
With these integrations, you can enable rich visualizations, monitoring, and alerting on the connected data. This article describes the recommended uses for each integration type or access method. Cost considerations for sending Azure AD activity logs to various endpoints are also covered.
2121

@@ -47,7 +47,7 @@ If you're performing troubleshooting tasks *and* you need to retain the logs for
4747

4848
If you're performing troubleshooting tasks *and* you need to retain the logs for more than 30 days, you can export your logs to an Azure storage account. This option is ideal of you don't plan on querying that data often.
4949

50-
If you need to query the data that you're retaining for more than 30 days, take a look at the monitoring, insights, and integrations options.
50+
If you need to query the data that you're retaining for more than 30 days, take a look at the analysis and monitoring options.
5151

5252
### Analysis and monitoring
5353

@@ -61,11 +61,11 @@ If you don't plan on using a third-party SIEM tool, we recommend sending your Az
6161

6262
There's a cost for sending data to a Log Analytics workspace, archiving data in a storage account, or streaming logs to an event hub. The amount of data and the cost incurred can vary significantly depending on the tenant size, the number of policies in use, and even the time of day.
6363

64-
Because the size and cost for sending logs to an endpoint is difficult to predict, the most accurate way to determine your expected costs is to route your logs to an endpoint for day or two. With this snapshot, you can get an accurate prediction for your expected costs.
64+
Because the size and cost for sending logs to an endpoint is difficult to predict, the most accurate way to determine your expected costs is to route your logs to an endpoint for day or two. With this snapshot, you can get an accurate prediction for your expected costs. You can also get an estimate of your costs by downloading a sample of your logs and multiplying accordingly to get an estimate for one day.
6565

66-
Other considerations for sending Azure AD logs to Azure Monitor are covered in the following Azure Monitor cost details articles:
66+
Other considerations for sending Azure AD logs to Azure Monitor logs are covered in the following Azure Monitor cost details articles:
6767

68-
- [Azure Monitor Logs cost calculations and options](../../azure-monitor/logs/cost-logs.md)
68+
- [Azure Monitor logs cost calculations and options](../../azure-monitor/logs/cost-logs.md)
6969
- [Azure Monitor cost and usage](../../azure-monitor/usage-estimated-costs.md)
7070
- [Optimize costs in Azure Monitor](../../azure-monitor/best-practices-cost.md)
7171

articles/active-directory/reports-monitoring/howto-access-activity-logs.md

Lines changed: 19 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -43,15 +43,7 @@ The required roles and licenses may vary based on the report. Global Administrat
4343

4444
*The level of access and capabilities for Identity Protection varies with the role and license. For more information, see the [license requirements for Identity Protection](../identity-protection/overview-identity-protection.md#license-requirements).
4545

46-
Activity reports are available for features that you've licensed. To access the sign-ins activity logs, your tenant must have an Azure AD Premium license associated with it.
47-
48-
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
49-
50-
1. Sign in to the [Azure portal](https://portal.azure.com) using one of the required roles.
51-
1. Go to **Azure AD** and select **Audit logs**, **Sign-in logs**, or **Provisioning logs**.
52-
1. Adjust the filter according to your needs.
53-
- For more information on the filter options for audit logs, see [Azure AD audit log categories and activities](reference-audit-activities.md).
54-
- For more information on the sign-in logs, see [Basic info in the Azure AD sign-in logs](reference-basic-info-sign-in-logs.md).
46+
Audit logs are available for features that you've licensed. To access the sign-ins logs using the Microsoft Graph API, your tenant must have an Azure AD Premium license associated with it.
5547

5648
## Stream logs to an event hub to integrate with SIEM tools
5749

@@ -77,22 +69,21 @@ The SIEM tools you can integrate with your event hub can provide analysis and mo
7769

7870
## Access logs with Microsoft Graph API
7971

80-
The Microsoft Graph API provides a unified programmability model that you can use to access data for your Azure AD Premium tenants. It doesn't require an administrator or developer to set up extra infrastructure to support your script or app. The Microsoft Graph API is **not** designed for pulling large amounts of activity data. Pulling large amounts of activity data using the API leads to issues with pagination and performance.
72+
The Microsoft Graph API provides a unified programmability model that you can use to access data for your Azure AD Premium tenants. It doesn't require an administrator or developer to set up extra infrastructure to support your script or app. The Microsoft Graph API is **not** designed for pulling large amounts of activity data. Pulling large amounts of activity data using the API may lead to issues with pagination and performance.
8173

8274
### Recommended uses
8375

8476
Using Microsoft Graph explorer, you can run queries to help you with the following types of scenarios:
8577

86-
- View tenant activities such as who made a change to a group and when
87-
- Mark an Azure AD sign-in event as safe or confirmed compromised
88-
- Retrieve a list of application sign-ins for the last 30 days
78+
- View tenant activities such as who made a change to a group and when.
79+
- Mark an Azure AD sign-in event as safe or confirmed compromised.
80+
- Retrieve a list of application sign-ins for the last 30 days.
8981

9082
### Quick steps
9183

92-
1. Configure the prerequisites.
84+
1. [Configure the prerequisites](howto-configure-prerequisites-for-reporting-api.md).
9385
1. Sign in to [Graph Explorer](https://aka.ms/ge).
94-
1. Select **GET** as the HTTP method from the dropdown.
95-
1. Set the API version to **beta** or **v1.0**, depending on the query.
86+
1. Set the HTTP method and API version.
9687
1. Add a query then select the **Run query** button.
9788
- [Familiarize yourself with the Microsoft Graph properties for directory audits](/graph/api/resources/directoryaudit)
9889
- [Complete the MS Graph Quickstart guide](quickstart-access-log-with-graph-api.md)
@@ -105,9 +96,9 @@ With the Azure Monitor logs integration, you can enable rich visualizations, mon
10596

10697
Integrating Azure AD logs with Azure Monitor logs provides a centralized location for querying logs. We recommend integrating logs with Azure Monitor logs for the following types of scenarios:
10798

108-
- Compare Azure AD sign-in logs with logs published by other Azure services
109-
- Correlate sign-in logs against Azure Application insights
110-
- Query logs using several specific search parameters
99+
- Compare Azure AD sign-in logs with logs published by other Azure services.
100+
- Correlate sign-in logs against Azure Application insights.
101+
- Query logs using specific search parameters.
111102

112103
### Quick steps
113104

@@ -116,22 +107,21 @@ Integrating Azure AD logs with Azure Monitor logs provides a centralized locatio
116107
1. Go to **Azure AD** > **Diagnostic settings**.
117108
1. Choose the logs you want to stream, select the **Send to Log Analytics workspace** option, and complete the fields.
118109
1. Go to **Azure AD** > **Log Analytics** and begin querying the data.
119-
120110
- [Integrate Azure AD logs with Azure Monitor logs](howto-integrate-activity-logs-with-log-analytics.md)
121-
- [Learn how to query Azure AD logs](howto-analyze-activity-logs-log-analytics.md)
111+
- [Learn how to query using Log Analytics](howto-analyze-activity-logs-log-analytics.md)
122112

123113
## Monitor events with Microsoft Sentinel
124114

125-
Sending sign-in and audit data to Microsoft Sentinel provides your security operations center with near real-time security detection and threat hunting. The term *threat hunting* refers to a proactive approach to improve the security posture of your environment. As opposed to classic protection, threat hunting tries to proactively identify potential threats that might harm your system. Your activity log data might be part of your threat hunting solution.
115+
Sending sign-in and audit logs to Microsoft Sentinel provides your security operations center with near real-time security detection and threat hunting. The term *threat hunting* refers to a proactive approach to improve the security posture of your environment. As opposed to classic protection, threat hunting tries to proactively identify potential threats that might harm your system. Your activity log data might be part of your threat hunting solution.
126116

127117
### Recommended uses
128118

129119
We recommend using the real-time security detection capabilities of Microsoft Sentinel if your organization needs security analytics and threat intelligence. Use Microsoft Sentinel if you need to:
130120

131-
- Collect security data across your enterprise
132-
- Detect threats with vast threat intelligence
133-
- Investigate critical incidents guided by AI
134-
- Respond rapidly and automate protection
121+
- Collect security data across your enterprise.
122+
- Detect threats with vast threat intelligence.
123+
- Investigate critical incidents guided by AI.
124+
- Respond rapidly and automate protection.
135125

136126
### Quick steps
137127

@@ -152,8 +142,8 @@ The data captured in the Azure AD activity logs are used in many reports and ser
152142

153143
The reports available in the Azure portal provide a wide range of capabilities to monitor activities and usage in your tenant. The following list of uses and scenarios isn't exhaustive, so explore the reports for your needs.
154144

155-
- Sign-in logs are helpful when researching a user's sign-in activity or to track an application's usage.
156-
- With audit logs you can review details around group name changes, device registration, password resets, and more.
145+
- Research a user's sign-in activity or track an application's usage.
146+
- Review details around group name changes, device registration, and password resets with audit logs.
157147
- Use the Identity Protection reports for monitoring at risk users, risky workload identities, and risky sign-ins.
158148
- To ensure that your users can access the applications in use in your tenant, you can review the sign-in success rate in the Azure AD application activity (preview) report from Usage and insights.
159149
- Compare the different authentication methods your users prefer with the Authentication methods report from Usage and insights.
@@ -192,7 +182,7 @@ The right solution for your long-term storage depends on your budget and what yo
192182

193183
[Azure Storage](../../storage/common/storage-introduction.md) is the right solution if you aren't planning on querying your data often. For more information, see [Archive directory logs to a storage account](quickstart-azure-monitor-route-logs-to-storage-account.md).
194184

195-
If you plan to query the logs often to run reports or perform analysis on the stored logs, you should integrate your data with Azure Monitor. Azure Monitor provides you with built-in reporting and alerting capabilities. To utilize this integration, you need to set up a Log Analytics workspace. Once you have the integration set up, you can use Log Analytics to query your logs.
185+
If you plan to query the logs often to run reports or perform analysis on the stored logs, you should [integrate your data with Azure Monitor logs](howto-integrate-activity-logs-with-log-analytics.md).
196186

197187
If your budget is tight, and you need a cheap method to create a long-term backup of your activity logs, you can [manually download your logs](howto-download-logs.md). The user interface of the activity logs in the portal provides you with an option to download the data as **JSON** or **CSV**. One trade off of the manual download is that it requires more manual interaction. If you're looking for a more professional solution, use either Azure Storage or Azure Monitor.
198188

0 commit comments

Comments
 (0)