You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/plan-monitoring-and-reporting.md
+34-34Lines changed: 34 additions & 34 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,29 +3,28 @@
3
3
title: Plan reports & monitoring deployment - Azure AD
4
4
description: Describes how to plan and execute implementation of reporting and monitoring.
5
5
services: active-directory
6
-
author: shlipsey3
7
-
manager: amycolannino
6
+
author: gargi-sinha
7
+
manager: martinco
8
8
ms.service: active-directory
9
9
ms.topic: conceptual
10
10
ms.workload: identity
11
11
ms.subservice: report-monitor
12
12
ms.date: 12/19/2022
13
13
ms.author: sarahlipsey
14
14
ms.reviewer: plenzke
15
-
16
-
# Customer intent: As an Azure AD administrator, I want to monitor logs and report on access to increase security
15
+
# Customer intent: For an Azure AD administrator to monitor logs and report on access
17
16
ms.collection: M365-identity-device-management
18
17
---
19
18
20
-
# Plan an Azure Active Directory reporting and monitoring deployment
19
+
# Azure Active Directory reporting and monitoring deployment dependencies
21
20
22
-
Your Azure Active Directory (Azure AD) reporting and monitoring solution depends on your legal, security, and operational requirements and your existing environment and processes. This article presents the various design options and guides you to the right deployment strategy.
21
+
Your Azure Active Directory (Azure AD) reporting and monitoring solution depends on legal, security, operational requirements, and your environment's processes. Use the following sections to learn about design options and deployment strategy.
23
22
24
-
###Benefits of Azure AD reporting and monitoring
23
+
## Benefits of Azure AD reporting and monitoring
25
24
26
-
Azure AD reporting provides a comprehensive view and logs of Azure AD activity in your environment, including sign-in events, audit events, and changes to your directory.
25
+
Azure AD reporting has a view, and logs, of Azure AD activity in your environment: sign-in and audit events, also changes to your directory.
27
26
28
-
The provided data enables you to:
27
+
Use data output to:
29
28
30
29
* determine how your apps and services are used.
31
30
* detect potential risks affecting the health of your environment.
@@ -48,8 +47,9 @@ For detailed feature and licensing information, see the [Azure Active Directory
48
47
49
48
To deploy Azure AD monitoring and reporting you'll need a user who is a Global Administrator or Security Administrator for the Azure AD tenant.
50
49
51
-
Depending on the final destination of your log data, you'll need one of the following:
52
-
50
+
*[Azure Monitor data platform](../../azure-monitor/data-platform.md)
51
+
*[Azure Monitor naming and terminology changes](../../azure-monitor/terminology.md)
52
+
*[How long does Azure AD store reporting data?](./reference-reports-data-retention.md)
53
53
* An Azure storage account that you have `ListKeys` permissions for. We recommend that you use a general storage account and not a Blob storage account. For storage pricing information, see the [Azure Storage pricing calculator](https://azure.microsoft.com/pricing/calculator/?service=storage).
54
54
* An Azure Event Hubs namespace to integrate with third-party SIEM solutions.
55
55
* An Azure Log Analytics workspace to send logs to Azure Monitor logs.
@@ -58,7 +58,7 @@ Depending on the final destination of your log data, you'll need one of the foll
58
58
59
59
Reporting and monitoring are used to meet your business requirements, gain insights into usage patterns, and increase your organization's security posture. In this project, you'll define the audiences that will consume and monitor reports, and define your Azure AD monitoring architecture.
60
60
61
-
### Engage the right stakeholders
61
+
##Stakeholders, communications, and documentation
62
62
63
63
When technology projects fail, they typically do so due to mismatched expectations on effect, outcomes, and responsibilities. To avoid these pitfalls, [ensure that you're engaging the right stakeholders](../fundamentals/active-directory-deployment-plans.md). Also ensure that stakeholder roles in the project are well understood by documenting the stakeholders and their project input and responsibilities.
64
64
@@ -75,13 +75,13 @@ The following roles can read Azure AD reports:
75
75
76
76
Learn More About [Azure AD Administrative Roles](../roles/permissions-reference.md). Always apply the concept of least privileges to reduce the risk of an account compromise. Consider implementing [Privileged Identity Management](../privileged-identity-management/pim-configure.md) to further secure your organization.
77
77
78
-
### Plan communications
78
+
### Engage stakeholders
79
79
80
-
Communication is critical to the success of any new service. Proactively communicate with your users how their experience will change, when it will change, and how to gain support if they experience issues.
80
+
Successful projects align expectations, outcomes, and responsibilities. See, [Azure Active Directory deployment plans](../fundamentals/active-directory-deployment-plans.md). Document and communicate stakeholder roles that require input and accountability.
81
81
82
-
### Document your current infrastructure and policies
82
+
### Communications plan
83
83
84
-
Your current infrastructure and policies will drive your reporting and monitoring design. Ensure that you know
84
+
Tell your users when, and how, their experience will change. Provide contact information for support.
85
85
86
86
* What, if any, SIEM tools you're using.
87
87
* Your Azure infrastructure, including existing storage accounts and monitoring being used.
@@ -91,36 +91,35 @@ Your current infrastructure and policies will drive your reporting and monitorin
91
91
92
92
To better prioritize the use cases and solutions, organize the options by "required for solution to meet business needs," "nice to have to meet business needs," and "not applicable."
93
93
94
-
|Area |Description |
95
-
|-|-|
96
-
|Retention|**Log retention of more than 30 days**. Due to legal or business requirements it's required to store audit logs and sign in logs of Azure AD longer than 30 days. |
97
-
|Analytics|**The logs need to be searchable**. The stored logs need to be searchable with analytic tools. |
98
-
| Operational Insights|**Insights for various teams**. The need to give access for different users to gain operational insights such as application usage, sign in errors, self-service usage, trends, etc. |
99
-
| Security Insights|**Insights for various teams**. The need to give access for different users to gain operational insights such as application usage, sign in errors, self service usage, trends, etc. |
100
-
| Integration in SIEM systems |**SIEM integration**. The need to integrate and stream Azure AD sign-in logs and audit logs to existing SIEM systems. |
94
+
### Considerations
101
95
102
-
### Choose a monitoring solution architecture
96
+
***Retention** - Log retention: store audit logs and sign in logs of Azure AD longer than 30 days
97
+
***Analytics** - Logs are searchable with analytic tools
98
+
***Operational and security insights** - Provide access to application usage, sign-in errors, self-service usage, trends, etc.
99
+
***SIEM integration** - Integrate and stream Azure AD sign-in logs and audit logs to SIEM systems
103
100
104
-
With Azure AD monitoring, you can route your Azure AD activity logs to a system that best meets your business needs. You can then retain them for long-term reporting and analysis to gain insights into your environment, and integrate it with SIEM tools.
101
+
### Monitoring solution architecture
105
102
106
-
#### Decision flow chart
103
+
With Azure AD monitoring, you can route Azure AD activity logs and retain them for long-term reporting and analysis to gain environment insights, and integrate it with SIEM tools. Use the following decision flow chart to help select an architecture.
107
104
108
-
#### Archive logs in a storage account
105
+

109
106
110
-
By routing logs to an Azure storage account, you can keep them for longer than the default retention period outlined in our [retention policies](./reference-reports-data-retention.md). Use this method if you need to archive your logs, but don't need to integrate them with an SIEM system, and don't need ongoing queries and analysis. You can still do on-demand searches.
107
+
#### Archive logs in a storage account
111
108
112
-
Learn how to [route data to your storage account](./quickstart-azure-monitor-route-logs-to-storage-account.md).
109
+
You can keep logs longer than the default retention period by routing them to an Azure storage account.
113
110
114
-
#### Send logs to Azure Monitor logs
111
+
> [!IMPORTANT]
112
+
> Use this archival method if there is no need to integrate logs with a SIEM system, or no need for ongoing queries and analysis. You can use on-demand searches.
115
113
116
-
[Azure Monitor logs](../../azure-monitor/logs/log-query-overview.md) consolidate monitoring data from different sources. It also provides a query language and analytics engine that gives you insights into the operation of your applications and use of resources. By sending Azure AD activity logs to Azure Monitor logs, you can quickly retrieve, monitor, and alert on collected data. Use this method when you don't have an existing SIEM solution that you want to send your data to directly but do want queries and analysis. Once your data is in Azure Monitor logs, you can then send it to event hub, and from there to a SIEM if you want to.
114
+
Learn more:
117
115
118
-
Learn how to [send data to Azure Monitor logs](./howto-integrate-activity-logs-with-log-analytics.md).
116
+
*[How long does Azure AD store reporting data?](./reference-reports-data-retention.md)
117
+
*[Tutorial: Archive Azure AD logs to an Azure storage account](./quickstart-azure-monitor-route-logs-to-storage-account.md)
119
118
120
119
#### Stream logs to storage and SIEM tools
121
120
122
-
Routing logs to an Azure event hub enables integration with third-party SIEM tools. This integration allows you to combine Azure AD activity log data with other data managed by your SIEM, to provide richer insights into your environment.
123
-
121
+
*[Integrate Azure AD logs with Azure Monitor logs](./howto-integrate-activity-logs-with-log-analytics.md).
122
+
*[Analyze Azure AD activity logs with Azure Monitor logs](/MicrosoftDocs/azure-docs/blob/main/articles/active-directory/reports-monitoring/howto-analyze-activity-logs-log-analytics.md).
124
123
* Learn how to [stream logs to an event hub](./tutorial-azure-monitor-stream-logs-to-event-hub.md).
125
124
* Learn how to [Archive Azure AD logs to an Azure Storage account](./quickstart-azure-monitor-route-logs-to-storage-account.md).
126
125
*[Integrate Azure AD logs with Splunk by using Azure Monitor](./howto-integrate-activity-logs-with-splunk.md)
@@ -132,3 +131,4 @@ Routing logs to an Azure event hub enables integration with third-party SIEM too
Copy file name to clipboardExpand all lines: articles/iot-edge/module-composition.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -115,7 +115,7 @@ The $edgeAgent properties follow this structure:
115
115
}
116
116
```
117
117
118
-
The IoT Edge agent schema version 1.4 was released along with IoT Edge version 1.0.10, and enables module startup order. Schema version 1.4 is recommended for any IoT Edge deployment running version 1.0.10 or later.
118
+
The IoT Edge agent schema version 1.1 was released along with IoT Edge version 1.0.10, and enables module startup order. Schema version 1.1 is recommended for any IoT Edge deployment running version 1.0.10 or later.
119
119
120
120
### Module configuration and management
121
121
@@ -215,7 +215,7 @@ Routes are declared in the **$edgeHub** desired properties with the following sy
215
215
}
216
216
```
217
217
218
-
The IoT Edge hub schema version 1.4 was released along with IoT Edge version 1.0.10, and enables route prioritization and time to live. Schema version 1.4 is recommended for any IoT Edge deployment running version 1.0.10 or later.
218
+
The IoT Edge hub schema version 1 was released along with IoT Edge version 1.0.10, and enables route prioritization and time to live. Schema version 1.1 is recommended for any IoT Edge deployment running version 1.0.10 or later.
219
219
220
220
Every route needs a *source* where the messages come from and a *sink* where the messages go. The *condition* is an optional piece that you can use to filter messages.
221
221
@@ -284,7 +284,7 @@ Option 1:
284
284
"route1": "FROM <source> WHERE <condition> INTO <sink>",
285
285
```
286
286
287
-
Option 2, introduced in IoT Edge version 1.0.10 with IoT Edge hub schema version 1.4:
287
+
Option 2, introduced in IoT Edge version 1.0.10 with IoT Edge hub schema version 1.1:
Copy file name to clipboardExpand all lines: articles/storage/blobs/lifecycle-management-overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -169,7 +169,7 @@ The run conditions are based on age. Current versions use the last modified time
169
169
| Action run condition | Condition value | Description |
170
170
|--|--|--|
171
171
| daysAfterModificationGreaterThan | Integer value indicating the age in days | The condition for actions on a current version of a blob |
172
-
| daysAfterCreationGreaterThan | Integer value indicating the age in days | The condition for actions on a previous version of a blob or a blob snapshot |
172
+
| daysAfterCreationGreaterThan | Integer value indicating the age in days | The condition for actions on the current version or previous version of a blob or a blob snapshot |
173
173
| daysAfterLastAccessTimeGreaterThan<sup>1</sup> | Integer value indicating the age in days | The condition for a current version of a blob when access tracking is enabled |
174
174
| daysAfterLastTierChangeGreaterThan | Integer value indicating the age in days after last blob tier change time | This condition applies only to `tierToArchive` actions and can be used only with the `daysAfterModificationGreaterThan` condition. |
0 commit comments