Skip to content

Commit 785095e

Browse files
Merge pull request #216260 from shlipsey3/concept-article-updates-10/25/22
Concept article updates 10/25/22
2 parents 7dbbffc + a2f4944 commit 785095e

File tree

81 files changed

+340
-508
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

81 files changed

+340
-508
lines changed

articles/active-directory/reports-monitoring/concept-activity-logs-azure-monitor.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.topic: conceptual
99
ms.workload: identity
1010
ms.subservice: report-monitor
11-
ms.date: 10/03/2022
11+
ms.date: 11/04/2022
1212
ms.author: sarahlipsey
1313
ms.reviewer: besiler
1414
ms.collection: M365-identity-device-management
@@ -41,15 +41,15 @@ To use this feature, you need:
4141
* A user who's a **Global Administrator** or **Security Administrator** for the Azure AD tenant.
4242
* Azure AD Premium 1, or Premium 2 [license](https://www.microsoft.com/security/business/identity-access-management/azure-ad-pricing), to access the Azure AD sign-in logs in the Azure portal.
4343

44-
Depending on where you want to route the audit log data, you need either of the following:
44+
Depending on where you want to route the audit log data, you need one of the following endpoints:
4545

4646
* An Azure storage account that you have *ListKeys* permissions for. We recommend that you use a general storage account and not a Blob storage account. For storage pricing information, see the [Azure Storage pricing calculator](https://azure.microsoft.com/pricing/calculator/?service=storage).
4747
* An Azure Event Hubs namespace to integrate with third-party solutions.
4848
* An Azure Log Analytics workspace to send logs to Azure Monitor logs.
4949

5050
## Cost considerations
5151

52-
If you already have an Azure AD license, you need an Azure subscription to set up the storage account and Event Hub. The Azure subscription comes at no cost, but you have to pay to utilize Azure resources, including the storage account that you use for archival and the Event Hub that you use for streaming. The amount of data and, thus, the cost incurred, can vary significantly depending on the tenant size.
52+
If you already have an Azure AD license, you need an Azure subscription to set up the storage account and Event Hubs. The Azure subscription comes at no cost, but you have to pay to utilize Azure resources, including the storage account that you use for archival and the Event Hubs that you use for streaming. The amount of data and, thus, the cost incurred, can vary significantly depending on the tenant size.
5353

5454
### Storage size for activity logs
5555

@@ -67,9 +67,9 @@ The following table contains a cost estimate of, depending on the size of the te
6767
| Sign-ins | 100,000 | 15 million | 1.7 TB | $35.41 | $424.92 |
6868

6969

70-
### Event Hub messages for activity logs
70+
### Event Hubs messages for activity logs
7171

72-
Events are batched into approximately five-minute intervals and sent as a single message that contains all the events within that timeframe. A message in the Event Hub has a maximum size of 256 KB, and if the total size of all the messages within the timeframe exceeds that volume, multiple messages are sent.
72+
Events are batched into approximately five-minute intervals and sent as a single message that contains all the events within that timeframe. A message in the Event Hubs has a maximum size of 256 KB. If the total size of all the messages within the timeframe exceeds that volume, multiple messages are sent.
7373

7474
For example, about 18 events per second ordinarily occur for a large tenant of more than 100,000 users, a rate that equates to 5,400 events every five minutes. Because audit logs are about 2 KB per event, this equates to 10.8 MB of data. Therefore, 43 messages are sent to the Event Hub in that five-minute interval.
7575

articles/active-directory/reports-monitoring/concept-all-sign-ins.md

Lines changed: 146 additions & 171 deletions
Large diffs are not rendered by default.

articles/active-directory/reports-monitoring/concept-audit-logs.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,19 +9,18 @@ ms.service: active-directory
99
ms.topic: conceptual
1010
ms.workload: identity
1111
ms.subservice: report-monitor
12-
ms.date: 10/03/2022
12+
ms.date: 11/04/2022
1313
ms.author: sarahlipsey
1414
ms.reviewer: besiler
1515
ms.collection: M365-identity-device-management
1616
---
1717
# Audit logs in Azure Active Directory
1818

19-
As an IT administrator, you want to know how your IT environment is doing. The information about your system’s health enables you to assess whether and how you need to respond to potential issues.
19+
Azure Active Directory (Azure AD) activity logs include audit logs, which is a comprehensive report on every logged event in Azure AD. Changes to applications, groups, users, and licenses are all captured in the Azure AD audit logs.
2020

21-
To support you with this goal, the Azure Active Directory (Azure AD) portal gives you access to three activity logs:
21+
Two other activity logs are also available to help monitor the health of your tenant:
2222

2323
- **[Sign-ins](concept-sign-ins.md)** – Information about sign-ins and how your resources are used by your users.
24-
- **[Audit](concept-audit-logs.md)** – Information about changes applied to your tenant such as users and group management or updates applied to your tenant’s resources.
2524
- **[Provisioning](concept-provisioning-logs.md)** – Activities performed by the provisioning service, such as the creation of a group in ServiceNow or a user imported from Workday.
2625

2726
This article gives you an overview of the audit logs.

articles/active-directory/reports-monitoring/concept-provisioning-logs.md

Lines changed: 24 additions & 51 deletions
Original file line numberDiff line numberDiff line change
@@ -8,26 +8,23 @@ ms.service: active-directory
88
ms.topic: conceptual
99
ms.workload: identity
1010
ms.subservice: report-monitor
11-
ms.date: 10/05/2022
11+
ms.date: 11/04/2022
1212
ms.author: sarahlipsey
1313
ms.reviewer: arvinh
1414

1515
ms.collection: M365-identity-device-management
1616
---
1717
# Provisioning logs in Azure Active Directory
1818

19-
As an IT administrator, you want to know how your IT environment is doing. The information about your system’s health enables you to assess whether and how you need to respond to potential issues.
19+
Azure Active Directory (Azure AD) integrates with several third party services to provision users into your tenant. If you need to troubleshoot an issue with a provisioned user, you can use the information captured in the Azure AD provisioning logs to help find a solution.
2020

21-
To support you with this goal, the Azure Active Directory portal gives you access to three activity logs:
21+
Two other activity logs are also available to help monitor the health of your tenant:
2222

2323
- **[Sign-ins](concept-sign-ins.md)** – Information about sign-ins and how your resources are used by your users.
2424
- **[Audit](concept-audit-logs.md)** – Information about changes applied to your tenant such as users and group management or updates applied to your tenant’s resources.
25-
- **[Provisioning](concept-provisioning-logs.md)** – Activities performed by the provisioning service, such as the creation of a group in ServiceNow or a user imported from Workday.
26-
2725

2826
This article gives you an overview of the provisioning logs.
2927

30-
3128
## What can I do with it?
3229

3330
You can use the provisioning logs to find answers to questions like:
@@ -39,9 +36,9 @@ You can use the provisioning logs to find answers to questions like:
3936
- What users from Workday were successfully created in Active Directory?
4037

4138

42-
## How can I access it?
39+
## How do you access the provisioning logs?
4340

44-
To view the provisioning activity report, your tenant must have an Azure AD Premium license associated with it. To upgrade your Azure AD edition, see [Getting started with Azure Active Directory Premium](../fundamentals/active-directory-get-started-premium.md).
41+
To view the provisioning logs, your tenant must have an Azure AD Premium license associated with it. To upgrade your Azure AD edition, see [Getting started with Azure Active Directory Premium](../fundamentals/active-directory-get-started-premium.md).
4542

4643
Application owners can view logs for their own applications. The following roles are required to view provisioning logs:
4744

@@ -64,61 +61,41 @@ To access the provisioning log data, you have the following options:
6461

6562
- Download the provisioning logs as a CSV or JSON file.
6663

67-
## What is the default view?
64+
## View the provisioning logs
6865

69-
A provisioning log has a default list view that shows:
66+
To more effectively view the provisioning log, spend a few moments customizing the view for your needs. You can specify what columns to include and filter the data to narrow things down.
7067

71-
- The identity
72-
- The action
73-
- The source system
74-
- The target system
75-
- The status
76-
- The date
68+
### Customize the layout
7769

78-
You can customize the list view by selecting **Columns** on the toolbar.
70+
The provisioning log has a default view, but you can customize columns.
71+
72+
1. Select **Columns** from the menu at the top of the log.
73+
1. Select the columns you want to view and select the **Save** button at the bottom of the window.
7974

8075
![Screenshot that shows the button for customizing columns.](./media/concept-provisioning-logs/column-chooser.png "Column chooser")
8176

8277
This area enables you to display more fields or remove fields that are already displayed.
8378

84-
![Screenshot that shows available columns with some selected.](./media/concept-provisioning-logs/available-columns.png "Available columns")
85-
86-
Select an item from the list to get more detailed information, such as the steps taken to provision the user and tips for troubleshooting issues.
87-
88-
![Screenshot that shows detailed information.](./media/concept-provisioning-logs/steps.png "Filter")
89-
90-
91-
## Filter provisioning activities
79+
## Filter the results
9280

9381
When you filter your provisioning data, some filter values are dynamically populated based on your tenant. For example, if you don't have any "create" events in your tenant, there won't be a **Create** filter option.
9482

95-
In the default view, you can select the following filters:
96-
97-
- Identity
98-
- Date
99-
- Status
100-
- Action
101-
102-
![Screenshot that shows filter values.](./media/concept-provisioning-logs/default-filter.png "Filter")
103-
10483
The **Identity** filter enables you to specify the name or the identity that you care about. This identity might be a user, group, role, or other object.
10584

106-
You can search by the name or ID of the object. The ID varies by scenario. For example, when you're provisioning an object from Azure AD to Salesforce, the source ID is the object ID of the user in Azure AD.
107-
The target ID is the ID of the user at Salesforce. When you're provisioning from Workday to Active Directory, the source ID is the Workday worker employee ID.
85+
You can search by the name or ID of the object. The ID varies by scenario.
86+
- If you're provisioning an object *from Azure AD to Salesforce*, the **source ID** is the object ID of the user in Azure AD. The **target ID** is the ID of the user at Salesforce.
87+
- If you're provisioning *from Workday to Azure AD*, the **source ID** is the Workday worker employee ID. The **target ID** is the ID of the user in Azure AD.
10888

10989
> [!NOTE]
11090
> The name of the user might not always be present in the **Identity** column. There will always be one ID.
11191
112-
11392
The **Date** filter enables to you to define a timeframe for the returned data. Possible values are:
11493

11594
- One month
11695
- Seven days
11796
- 30 days
11897
- 24 hours
119-
- Custom time interval
120-
121-
When you select a custom time frame, you can configure a start date and an end date.
98+
- Custom time interval (configure a start date and an end date)
12299

123100
The **Status** filter enables you to select:
124101

@@ -137,8 +114,6 @@ The **Action** filter enables you to filter these actions:
137114

138115
In addition to the filters of the default view, you can set the following filters.
139116

140-
![Screenshot that shows fields that you can add as filters.](./media/concept-provisioning-logs/add-filter.png "Pick a field")
141-
142117
- **Job ID**: A unique job ID is associated with each application that you've enabled provisioning for.
143118

144119
- **Cycle ID**: The cycle ID uniquely identifies the provisioning cycle. You can share this ID with product support to look up the cycle in which this event occurred.
@@ -151,11 +126,9 @@ In addition to the filters of the default view, you can set the following filter
151126

152127
- **Application**: You can show only records of applications with a display name that contains a specific string.
153128

154-
## Provisioning details
155-
156-
When you select an item in the provisioning list view, you get more details about this item. The details are grouped into the following tabs.
129+
## Analyze the provisioning logs
157130

158-
![Screenshot that shows four tabs that contain provisioning details.](./media/concept-provisioning-logs/provisioning-tabs.png "Tabs")
131+
When you select an item in the provisioning list view, you get more details about this item, such as the steps taken to provision the user and tips for troubleshooting issues. The details are grouped into four tabs.
159132

160133
- **Steps**: Outlines the steps taken to provision an object. Provisioning an object can consist of four steps:
161134

@@ -236,15 +209,15 @@ Use the following table to better understand how to resolve errors that you find
236209

237210
|Error code|Description|
238211
|---|---|
239-
|Conflict, EntryConflict|Correct the conflicting attribute values in either Azure AD or the application. Or, review your matching attribute configuration if the conflicting user account was supposed to be matched and taken over. Review the [documentation](../app-provisioning/customize-application-attributes.md) for more information on configuring matching attributes.|
212+
|Conflict,<br>EntryConflict|Correct the conflicting attribute values in either Azure AD or the application. Or, review your matching attribute configuration if the conflicting user account was supposed to be matched and taken over. Review the [documentation](../app-provisioning/customize-application-attributes.md) for more information on configuring matching attributes.|
240213
|TooManyRequests|The target app rejected this attempt to update the user because it's overloaded and receiving too many requests. There's nothing to do. This attempt will automatically be retired. Microsoft has also been notified of this issue.|
241214
|InternalServerError |The target app returned an unexpected error. A service issue with the target application might be preventing it from working. This attempt will automatically be retried in 40 minutes.|
242-
|InsufficientRights, MethodNotAllowed, NotPermitted, Unauthorized| Azure AD authenticated with the target application but wasn't authorized to perform the update. Review any instructions that the target application has provided, along with the respective application [tutorial](../saas-apps/tutorial-list.md).|
215+
|InsufficientRights,<br>MethodNotAllowed,<br>NotPermitted,<br>Unauthorized| Azure AD authenticated with the target application but wasn't authorized to perform the update. Review any instructions that the target application has provided, along with the respective application [tutorial](../saas-apps/tutorial-list.md).|
243216
|UnprocessableEntity|The target application returned an unexpected response. The configuration of the target application might not be correct, or a service issue with the target application might be preventing it from working.|
244217
|WebExceptionProtocolError |An HTTP protocol error occurred in connecting to the target application. There's nothing to do. This attempt will automatically be retried in 40 minutes.|
245218
|InvalidAnchor|A user that was previously created or matched by the provisioning service no longer exists. Ensure that the user exists. To force a new matching of all users, use the Microsoft Graph API to [restart the job](/graph/api/synchronization-synchronizationjob-restart?tabs=http&view=graph-rest-beta&preserve-view=true). <br><br>Restarting provisioning will trigger an initial cycle, which can take time to complete. Restarting provisioning also deletes the cache that the provisioning service uses to operate. That means all users and groups in the tenant will have to be evaluated again, and certain provisioning events might be dropped.|
246219
|NotImplemented | The target app returned an unexpected response. The configuration of the app might not be correct, or a service issue with the target app might be preventing it from working. Review any instructions that the target application has provided, along with the respective application [tutorial](../saas-apps/tutorial-list.md). |
247-
|MandatoryFieldsMissing, MissingValues |The user couldn't be created because required values are missing. Correct the missing attribute values in the source record, or review your matching attribute configuration to ensure that the required fields aren't omitted. [Learn more](../app-provisioning/customize-application-attributes.md) about configuring matching attributes.|
220+
|MandatoryFieldsMissing,<br>MissingValues |The user couldn't be created because required values are missing. Correct the missing attribute values in the source record, or review your matching attribute configuration to ensure that the required fields aren't omitted. [Learn more](../app-provisioning/customize-application-attributes.md) about configuring matching attributes.|
248221
|SchemaAttributeNotFound |The operation couldn't be performed because an attribute was specified that doesn't exist in the target application. See the [documentation](../app-provisioning/customize-application-attributes.md) on attribute customization and ensure that your configuration is correct.|
249222
|InternalError |An internal service error occurred within the Azure AD provisioning service. There's nothing to do. This attempt will automatically be retried in 40 minutes.|
250223
|InvalidDomain |The operation couldn't be performed because an attribute value contains an invalid domain name. Update the domain name on the user or add it to the permitted list in the target application. |
@@ -254,8 +227,8 @@ Use the following table to better understand how to resolve errors that you find
254227
|DuplicateSourceEntries | The operation couldn't be completed because more than one user was found with the configured matching attributes. Remove the duplicate user, or [reconfigure your attribute mappings](../app-provisioning/customize-application-attributes.md).|
255228
|ImportSkipped | When each user is evaluated, the system tries to import the user from the source system. This error commonly occurs when the user who's being imported is missing the matching property defined in your attribute mappings. Without a value present on the user object for the matching attribute, the system can't evaluate scoping, matching, or export changes. The presence of this error doesn't indicate that the user is in scope, because you haven't yet evaluated scoping for the user.|
256229
|EntrySynchronizationSkipped | The provisioning service has successfully queried the source system and identified the user. No further action was taken on the user and they were skipped. The user might have been out of scope, or the user might have already existed in the target system with no further changes required.|
257-
|SystemForCrossDomainIdentityManagementMultipleEntriesInResponse| A GET request to retrieve a user or group received multiple users or groups in the response. The system expects to receive only one user or group in the response. For example, if you do a [GET Group request](../app-provisioning/use-scim-to-provision-users-and-groups.md#get-group) to retrieve a group, provide a filter to exclude members, and your System for Cross-Domain Identity Management (SCIM) endpoint returns the members, you'll get this error.|
258-
|SystemForCrossDomainIdentityManagementServiceIncompatible|The Azure AD provisioning service is unable to parse the response from the third party application. Work with the application developer to ensure that the SCIM server is compatible with the [Azure AD SCIM client](../app-provisioning/use-scim-to-provision-users-and-groups.md#understand-the-azure-ad-scim-implementation).|
230+
|SystemForCrossDomainIdentity<br>ManagementMultipleEntriesInResponse| A GET request to retrieve a user or group received multiple users or groups in the response. The system expects to receive only one user or group in the response. For example, if you do a [GET Group request](../app-provisioning/use-scim-to-provision-users-and-groups.md#get-group) to retrieve a group, provide a filter to exclude members, and your System for Cross-Domain Identity Management (SCIM) endpoint returns the members, you'll get this error.|
231+
|SystemForCrossDomainIdentity<br>ManagementServiceIncompatible|The Azure AD provisioning service is unable to parse the response from the third party application. Work with the application developer to ensure that the SCIM server is compatible with the [Azure AD SCIM client](../app-provisioning/use-scim-to-provision-users-and-groups.md#understand-the-azure-ad-scim-implementation).|
259232
|SchemaPropertyCanOnlyAcceptValue|The property in the target system can only accept one value, but the property in the source system has multiple. Ensure that you either map a single-valued attribute to the property that is throwing an error, update the value in the source to be single-valued, or remove the attribute from the mappings.|
260233

261234
## Next steps

0 commit comments

Comments
 (0)