You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/governance/entitlement-management-logs-and-reporting.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.tgt_pltfrm: na
12
12
ms.devlang: na
13
13
ms.topic: conceptual
14
14
ms.subservice: compliance
15
-
ms.date: 01/22/2020
15
+
ms.date: 02/27/2020
16
16
ms.author: ajburnle
17
17
ms.reviewer:
18
18
ms.collection: M365-identity-device-management
@@ -29,7 +29,7 @@ Azure AD stores audit events for up to 30 days in the audit log. However, you ca
29
29
## Configure Azure AD to use Azure Monitor
30
30
Before using the Azure Monitor workbooks, you must configure Azure AD to send a copy of its audit logs to Azure Monitor.
31
31
32
-
Archiving Azure AD audit logs requires you to have Azure Monitor in an Azure subscription. You can read more about the prerequisites and estimated costs of using Azure Monitor for this scenario in [Azure AD activity logs in Azure Monitor](../reports-monitoring/concept-activity-logs-azure-monitor.md).
32
+
Archiving Azure AD audit logs requires you to have Azure Monitor in an Azure subscription. You can read more about the prerequisites and estimated costs of using Azure Monitor in [Azure AD activity logs in Azure Monitor](../reports-monitoring/concept-activity-logs-azure-monitor.md).
33
33
34
34
**Prerequisite role**: Global Admin
35
35
@@ -54,7 +54,7 @@ You can create your own queries on Azure AD audit events, including entitlement
54
54
55
55
1. In Azure Active Directory of the Azure portal, click **Logs** under the Monitoring section in the left navigation menu to create a new query page.
56
56
57
-
1. Your workspace should be shown in the upper left of the query page. If you have multiple Azure Monitor workspaces, and the workspace you're using to store Azure AD audit events isn't shown, click **Select Scope** and select the correct subscription and workspace.
57
+
1. Your workspace should be shown in the upper left of the query page. If you have multiple Azure Monitor workspaces, and the workspace you're using to store Azure AD audit events isn't shown, click **Select Scope**. Then, select the correct subscription and workspace.
58
58
59
59
1. Next, in the query text area, delete the string “search *” and replace it with the following query:
60
60
@@ -78,11 +78,11 @@ For more information on the columns that are stored for audit events in Azure Mo
78
78
79
79
## Create custom Azure Monitor queries using Azure PowerShell
80
80
81
-
Once you've configured Azure AD to send logs to Azure Monitor, you can access those logs through PowerShell. You can send queries from scripts or the PowerShell command line, without needing to be a Global Admin in the tenant.
81
+
You can access logs through PowerShell after you've configured Azure AD to send logs to Azure Monitor. Then, send queries from scripts or the PowerShell command line, without needing to be a Global Admin in the tenant.
82
82
83
83
### Ensure the user or service principal has the correct role assignment
84
84
85
-
You'll want to ensure you, or the user or service principal authenticating to Azure AD, are in the appropriate Azure role in the Log Analytics workspace. The role options are either Log Analytics Reader or the Log Analytics Contributor. If you're already in one of those roles, then skip to [Retrieve Log Analytics ID with one Azure subscription](#retrieve-log-analytics-id-with-one-azure-subscription).
85
+
Make sure you, the user or service principal that will authenticate to Azure AD, are in the appropriate Azure role in the Log Analytics workspace. The role options are either Log Analytics Reader or the Log Analytics Contributor. If you're already in one of those roles, then skip to [Retrieve Log Analytics ID with one Azure subscription](#retrieve-log-analytics-id-with-one-azure-subscription).
86
86
87
87
To set the role assignment and create a query, do the following steps:
88
88
1. In the Azure Portal, locate the [Log Analytics workspace](https://portal.azure.com/#blade/HubsExtension/BrowseResourceBlade/resourceType/Microsoft.OperationalInsights%2Fworkspaces
@@ -96,7 +96,7 @@ To set the role assignment and create a query, do the following steps:
96
96
97
97
### Install Azure PowerShell module
98
98
99
-
1. Once you have the appropriate role assignment, launch PowerShell, and [install the Azure PowerShell module](/powershell/azure/install-az-ps?view=azps-3.3.0) (if you haven’t already), by typing:
99
+
Once you have the appropriate role assignment, launch PowerShell, and [install the Azure PowerShell module](/powershell/azure/install-az-ps?view=azps-3.3.0) (if you haven’t already), by typing:
100
100
101
101
```azurepowershell
102
102
install-module -Name az -allowClobber -Scope CurrentUser
@@ -105,7 +105,7 @@ install-module -Name az -allowClobber -Scope CurrentUser
105
105
Now you're ready to authenticate to Azure AD, and retrieve the id of the Log Analytics workspace you’re querying.
106
106
107
107
### Retrieve Log Analytics ID with one Azure subscription
108
-
If you have only a single Azure subscription, and a single Log Analytics workspace, then authenticate to Azure AD, connecting to that subscription and retrieving that workspace, by typing:
108
+
If you have only a single Azure subscription, and a single Log Analytics workspace, then type the following to authenticate to Azure AD, connect to that subscription, and retrieve that workspace:
109
109
110
110
```azurepowershell
111
111
Connect-AzAccount
@@ -127,7 +127,7 @@ $subs | ft
127
127
You can reauthenticate and associate your PowerShell session to that subscription using a command such as `Connect-AzAccount –Subscription $subs[0].id`. To learn more about how to authenticate to Azure from PowerShell, including non-interactively, see [Sign in with Azure PowerShell](/powershell/azure/authenticate-azureps?view=azps-3.3.0&viewFallbackFrom=azps-2.5.0
128
128
).
129
129
130
-
If you have multiple Log Analytics workspaces in that subscription, then the cmdlet [Get-AzOperationalInsightsWorkspace](/powershell/module/Az.OperationalInsights/Get-AzOperationalInsightsWorkspace) returns the list of workspaces, so you can find the one that has the Azure AD logs. The `CustomerId` field returned by this cmdlet is the same as the value of the "Workspace id" displayed in the Azure Portal in the Log Analytics workspace overview.
130
+
If you have multiple Log Analytics workspaces in that subscription, then the cmdlet [Get-AzOperationalInsightsWorkspace](/powershell/module/Az.OperationalInsights/Get-AzOperationalInsightsWorkspace) returns the list of workspaces. Then you can find the one that has the Azure AD logs. The `CustomerId` field returned by this cmdlet is the same as the value of the "Workspace id" displayed in the Azure Portal in the Log Analytics workspace overview.
0 commit comments