You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/concept-activity-logs-azure-monitor.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,14 +8,14 @@ ms.service: active-directory
8
8
ms.topic: conceptual
9
9
ms.workload: identity
10
10
ms.subservice: report-monitor
11
-
ms.date: 07/26/2023
11
+
ms.date: 07/27/2023
12
12
ms.author: sarahlipsey
13
13
ms.reviewer: besiler
14
14
ms.collection: M365-identity-device-management
15
15
---
16
16
# Azure AD activity log integrations
17
17
18
-
Using **Diagnostic settings** in Azure Active Directory (Azure AD), you can route activity logs to several endpoints for long term retention and data insights. You can archive logs for storage, route to Security Information and Event Management (SIEM) tools, and integrate logs with Azure Monitor logs.
18
+
Using **Diagnostic settings** in Azure Active Directory (Azure AD), you can route activity logs to several endpoints for long term data retention and insights. You can archive logs for storage, route to Security Information and Event Management (SIEM) tools, and integrate logs with Azure Monitor logs.
19
19
20
20
With these integrations, you can enable rich visualizations, monitoring, and alerting on the connected data. This article describes the recommended uses for each integration type or access method. Cost considerations for sending Azure AD activity logs to various endpoints are also covered.
21
21
@@ -47,7 +47,7 @@ If you're performing troubleshooting tasks *and* you need to retain the logs for
47
47
48
48
If you're performing troubleshooting tasks *and* you need to retain the logs for more than 30 days, you can export your logs to an Azure storage account. This option is ideal of you don't plan on querying that data often.
49
49
50
-
If you need to query the data that you're retaining for more than 30 days, take a look at the monitoring, insights, and integrations options.
50
+
If you need to query the data that you're retaining for more than 30 days, take a look at the analysis and monitoring options.
51
51
52
52
### Analysis and monitoring
53
53
@@ -61,11 +61,11 @@ If you don't plan on using a third-party SIEM tool, we recommend sending your Az
61
61
62
62
There's a cost for sending data to a Log Analytics workspace, archiving data in a storage account, or streaming logs to an event hub. The amount of data and the cost incurred can vary significantly depending on the tenant size, the number of policies in use, and even the time of day.
63
63
64
-
Because the size and cost for sending logs to an endpoint is difficult to predict, the most accurate way to determine your expected costs is to route your logs to an endpoint for day or two. With this snapshot, you can get an accurate prediction for your expected costs.
64
+
Because the size and cost for sending logs to an endpoint is difficult to predict, the most accurate way to determine your expected costs is to route your logs to an endpoint for day or two. With this snapshot, you can get an accurate prediction for your expected costs. You can also get an estimate of your costs by downloading a sample of your logs and multiplying accordingly to get an estimate for one day.
65
65
66
-
Other considerations for sending Azure AD logs to Azure Monitor are covered in the following Azure Monitor cost details articles:
66
+
Other considerations for sending Azure AD logs to Azure Monitor logs are covered in the following Azure Monitor cost details articles:
67
67
68
-
-[Azure Monitor Logs cost calculations and options](../../azure-monitor/logs/cost-logs.md)
68
+
-[Azure Monitor logs cost calculations and options](../../azure-monitor/logs/cost-logs.md)
69
69
-[Azure Monitor cost and usage](../../azure-monitor/usage-estimated-costs.md)
70
70
-[Optimize costs in Azure Monitor](../../azure-monitor/best-practices-cost.md)
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/howto-access-activity-logs.md
+19-29Lines changed: 19 additions & 29 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,15 +43,7 @@ The required roles and licenses may vary based on the report. Global Administrat
43
43
44
44
*The level of access and capabilities for Identity Protection varies with the role and license. For more information, see the [license requirements for Identity Protection](../identity-protection/overview-identity-protection.md#license-requirements).
45
45
46
-
Activity reports are available for features that you've licensed. To access the sign-ins activity logs, your tenant must have an Azure AD Premium license associated with it.
1. Sign in to the [Azure portal](https://portal.azure.com) using one of the required roles.
51
-
1. Go to **Azure AD** and select **Audit logs**, **Sign-in logs**, or **Provisioning logs**.
52
-
1. Adjust the filter according to your needs.
53
-
- For more information on the filter options for audit logs, see [Azure AD audit log categories and activities](reference-audit-activities.md).
54
-
- For more information on the sign-in logs, see [Basic info in the Azure AD sign-in logs](reference-basic-info-sign-in-logs.md).
46
+
Audit logs are available for features that you've licensed. To access the sign-ins logs using the Microsoft Graph API, your tenant must have an Azure AD Premium license associated with it.
55
47
56
48
## Stream logs to an event hub to integrate with SIEM tools
57
49
@@ -77,22 +69,21 @@ The SIEM tools you can integrate with your event hub can provide analysis and mo
77
69
78
70
## Access logs with Microsoft Graph API
79
71
80
-
The Microsoft Graph API provides a unified programmability model that you can use to access data for your Azure AD Premium tenants. It doesn't require an administrator or developer to set up extra infrastructure to support your script or app. The Microsoft Graph API is **not** designed for pulling large amounts of activity data. Pulling large amounts of activity data using the API leads to issues with pagination and performance.
72
+
The Microsoft Graph API provides a unified programmability model that you can use to access data for your Azure AD Premium tenants. It doesn't require an administrator or developer to set up extra infrastructure to support your script or app. The Microsoft Graph API is **not** designed for pulling large amounts of activity data. Pulling large amounts of activity data using the API may lead to issues with pagination and performance.
81
73
82
74
### Recommended uses
83
75
84
76
Using Microsoft Graph explorer, you can run queries to help you with the following types of scenarios:
85
77
86
-
- View tenant activities such as who made a change to a group and when
87
-
- Mark an Azure AD sign-in event as safe or confirmed compromised
88
-
- Retrieve a list of application sign-ins for the last 30 days
78
+
- View tenant activities such as who made a change to a group and when.
79
+
- Mark an Azure AD sign-in event as safe or confirmed compromised.
80
+
- Retrieve a list of application sign-ins for the last 30 days.
89
81
90
82
### Quick steps
91
83
92
-
1. Configure the prerequisites.
84
+
1.[Configure the prerequisites](howto-configure-prerequisites-for-reporting-api.md).
93
85
1. Sign in to [Graph Explorer](https://aka.ms/ge).
94
-
1. Select **GET** as the HTTP method from the dropdown.
95
-
1. Set the API version to **beta** or **v1.0**, depending on the query.
86
+
1. Set the HTTP method and API version.
96
87
1. Add a query then select the **Run query** button.
97
88
-[Familiarize yourself with the Microsoft Graph properties for directory audits](/graph/api/resources/directoryaudit)
98
89
-[Complete the MS Graph Quickstart guide](quickstart-access-log-with-graph-api.md)
@@ -105,9 +96,9 @@ With the Azure Monitor logs integration, you can enable rich visualizations, mon
105
96
106
97
Integrating Azure AD logs with Azure Monitor logs provides a centralized location for querying logs. We recommend integrating logs with Azure Monitor logs for the following types of scenarios:
107
98
108
-
- Compare Azure AD sign-in logs with logs published by other Azure services
109
-
- Correlate sign-in logs against Azure Application insights
110
-
- Query logs using several specific search parameters
99
+
- Compare Azure AD sign-in logs with logs published by other Azure services.
100
+
- Correlate sign-in logs against Azure Application insights.
101
+
- Query logs using specific search parameters.
111
102
112
103
### Quick steps
113
104
@@ -116,22 +107,21 @@ Integrating Azure AD logs with Azure Monitor logs provides a centralized locatio
116
107
1. Go to **Azure AD** > **Diagnostic settings**.
117
108
1. Choose the logs you want to stream, select the **Send to Log Analytics workspace** option, and complete the fields.
118
109
1. Go to **Azure AD** > **Log Analytics** and begin querying the data.
119
-
120
110
-[Integrate Azure AD logs with Azure Monitor logs](howto-integrate-activity-logs-with-log-analytics.md)
121
-
-[Learn how to query Azure AD logs](howto-analyze-activity-logs-log-analytics.md)
111
+
-[Learn how to query using Log Analytics](howto-analyze-activity-logs-log-analytics.md)
122
112
123
113
## Monitor events with Microsoft Sentinel
124
114
125
-
Sending sign-in and audit data to Microsoft Sentinel provides your security operations center with near real-time security detection and threat hunting. The term *threat hunting* refers to a proactive approach to improve the security posture of your environment. As opposed to classic protection, threat hunting tries to proactively identify potential threats that might harm your system. Your activity log data might be part of your threat hunting solution.
115
+
Sending sign-in and audit logs to Microsoft Sentinel provides your security operations center with near real-time security detection and threat hunting. The term *threat hunting* refers to a proactive approach to improve the security posture of your environment. As opposed to classic protection, threat hunting tries to proactively identify potential threats that might harm your system. Your activity log data might be part of your threat hunting solution.
126
116
127
117
### Recommended uses
128
118
129
119
We recommend using the real-time security detection capabilities of Microsoft Sentinel if your organization needs security analytics and threat intelligence. Use Microsoft Sentinel if you need to:
130
120
131
-
- Collect security data across your enterprise
132
-
- Detect threats with vast threat intelligence
133
-
- Investigate critical incidents guided by AI
134
-
- Respond rapidly and automate protection
121
+
- Collect security data across your enterprise.
122
+
- Detect threats with vast threat intelligence.
123
+
- Investigate critical incidents guided by AI.
124
+
- Respond rapidly and automate protection.
135
125
136
126
### Quick steps
137
127
@@ -152,8 +142,8 @@ The data captured in the Azure AD activity logs are used in many reports and ser
152
142
153
143
The reports available in the Azure portal provide a wide range of capabilities to monitor activities and usage in your tenant. The following list of uses and scenarios isn't exhaustive, so explore the reports for your needs.
154
144
155
-
-Sign-in logs are helpful when researching a user's sign-in activity or to track an application's usage.
156
-
-With audit logs you can review details around group name changes, device registration, password resets, and more.
145
+
-Research a user's sign-in activity or track an application's usage.
146
+
-Review details around group name changes, device registration, and password resets with audit logs.
157
147
- Use the Identity Protection reports for monitoring at risk users, risky workload identities, and risky sign-ins.
158
148
- To ensure that your users can access the applications in use in your tenant, you can review the sign-in success rate in the Azure AD application activity (preview) report from Usage and insights.
159
149
- Compare the different authentication methods your users prefer with the Authentication methods report from Usage and insights.
@@ -192,7 +182,7 @@ The right solution for your long-term storage depends on your budget and what yo
192
182
193
183
[Azure Storage](../../storage/common/storage-introduction.md) is the right solution if you aren't planning on querying your data often. For more information, see [Archive directory logs to a storage account](quickstart-azure-monitor-route-logs-to-storage-account.md).
194
184
195
-
If you plan to query the logs often to run reports or perform analysis on the stored logs, you should integrate your data with Azure Monitor. Azure Monitor provides you with built-in reporting and alerting capabilities. To utilize this integration, you need to set up a Log Analytics workspace. Once you have the integration set up, you can use Log Analytics to query your logs.
185
+
If you plan to query the logs often to run reports or perform analysis on the stored logs, you should [integrate your data with Azure Monitor logs](howto-integrate-activity-logs-with-log-analytics.md).
196
186
197
187
If your budget is tight, and you need a cheap method to create a long-term backup of your activity logs, you can [manually download your logs](howto-download-logs.md). The user interface of the activity logs in the portal provides you with an option to download the data as **JSON** or **CSV**. One trade off of the manual download is that it requires more manual interaction. If you're looking for a more professional solution, use either Azure Storage or Azure Monitor.
0 commit comments