You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/concept-activity-logs-azure-monitor.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.topic: conceptual
9
9
ms.workload: identity
10
10
ms.subservice: report-monitor
11
-
ms.date: 10/03/2022
11
+
ms.date: 11/04/2022
12
12
ms.author: sarahlipsey
13
13
ms.reviewer: besiler
14
14
ms.collection: M365-identity-device-management
@@ -41,15 +41,15 @@ To use this feature, you need:
41
41
* A user who's a **Global Administrator** or **Security Administrator** for the Azure AD tenant.
42
42
* Azure AD Premium 1, or Premium 2 [license](https://www.microsoft.com/security/business/identity-access-management/azure-ad-pricing), to access the Azure AD sign-in logs in the Azure portal.
43
43
44
-
Depending on where you want to route the audit log data, you need either of the following:
44
+
Depending on where you want to route the audit log data, you need one of the following endpoints:
45
45
46
46
* An Azure storage account that you have *ListKeys* permissions for. We recommend that you use a general storage account and not a Blob storage account. For storage pricing information, see the [Azure Storage pricing calculator](https://azure.microsoft.com/pricing/calculator/?service=storage).
47
47
* An Azure Event Hubs namespace to integrate with third-party solutions.
48
48
* An Azure Log Analytics workspace to send logs to Azure Monitor logs.
49
49
50
50
## Cost considerations
51
51
52
-
If you already have an Azure AD license, you need an Azure subscription to set up the storage account and Event Hub. The Azure subscription comes at no cost, but you have to pay to utilize Azure resources, including the storage account that you use for archival and the Event Hub that you use for streaming. The amount of data and, thus, the cost incurred, can vary significantly depending on the tenant size.
52
+
If you already have an Azure AD license, you need an Azure subscription to set up the storage account and Event Hubs. The Azure subscription comes at no cost, but you have to pay to utilize Azure resources, including the storage account that you use for archival and the Event Hubs that you use for streaming. The amount of data and, thus, the cost incurred, can vary significantly depending on the tenant size.
53
53
54
54
### Storage size for activity logs
55
55
@@ -67,9 +67,9 @@ The following table contains a cost estimate of, depending on the size of the te
Events are batched into approximately five-minute intervals and sent as a single message that contains all the events within that timeframe. A message in the Event Hub has a maximum size of 256 KB, and if the total size of all the messages within the timeframe exceeds that volume, multiple messages are sent.
72
+
Events are batched into approximately five-minute intervals and sent as a single message that contains all the events within that timeframe. A message in the Event Hubs has a maximum size of 256 KB. If the total size of all the messages within the timeframe exceeds that volume, multiple messages are sent.
73
73
74
74
For example, about 18 events per second ordinarily occur for a large tenant of more than 100,000 users, a rate that equates to 5,400 events every five minutes. Because audit logs are about 2 KB per event, this equates to 10.8 MB of data. Therefore, 43 messages are sent to the Event Hub in that five-minute interval.
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/concept-audit-logs.md
+3-4Lines changed: 3 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,19 +9,18 @@ ms.service: active-directory
9
9
ms.topic: conceptual
10
10
ms.workload: identity
11
11
ms.subservice: report-monitor
12
-
ms.date: 10/03/2022
12
+
ms.date: 11/04/2022
13
13
ms.author: sarahlipsey
14
14
ms.reviewer: besiler
15
15
ms.collection: M365-identity-device-management
16
16
---
17
17
# Audit logs in Azure Active Directory
18
18
19
-
As an IT administrator, you want to know how your IT environment is doing. The information about your system’s health enables you to assess whether and how you need to respond to potential issues.
19
+
Azure Active Directory (Azure AD) activity logs include audit logs, which is a comprehensive report on every logged event in Azure AD. Changes to applications, groups, users, and licenses are all captured in the Azure AD audit logs.
20
20
21
-
To support you with this goal, the Azure Active Directory (Azure AD) portal gives you access to three activity logs:
21
+
Two other activity logs are also available to help monitor the health of your tenant:
22
22
23
23
-**[Sign-ins](concept-sign-ins.md)** – Information about sign-ins and how your resources are used by your users.
24
-
-**[Audit](concept-audit-logs.md)** – Information about changes applied to your tenant such as users and group management or updates applied to your tenant’s resources.
25
24
-**[Provisioning](concept-provisioning-logs.md)** – Activities performed by the provisioning service, such as the creation of a group in ServiceNow or a user imported from Workday.
26
25
27
26
This article gives you an overview of the audit logs.
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/concept-provisioning-logs.md
+24-51Lines changed: 24 additions & 51 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,26 +8,23 @@ ms.service: active-directory
8
8
ms.topic: conceptual
9
9
ms.workload: identity
10
10
ms.subservice: report-monitor
11
-
ms.date: 10/05/2022
11
+
ms.date: 11/04/2022
12
12
ms.author: sarahlipsey
13
13
ms.reviewer: arvinh
14
14
15
15
ms.collection: M365-identity-device-management
16
16
---
17
17
# Provisioning logs in Azure Active Directory
18
18
19
-
As an IT administrator, you want to know how your IT environment is doing. The information about your system’s health enables you to assess whether and how you need to respond to potential issues.
19
+
Azure Active Directory (Azure AD) integrates with several third party services to provision users into your tenant. If you need to troubleshoot an issue with a provisioned user, you can use the information captured in the Azure AD provisioning logs to help find a solution.
20
20
21
-
To support you with this goal, the Azure Active Directory portal gives you access to three activity logs:
21
+
Two other activity logs are also available to help monitor the health of your tenant:
22
22
23
23
-**[Sign-ins](concept-sign-ins.md)** – Information about sign-ins and how your resources are used by your users.
24
24
-**[Audit](concept-audit-logs.md)** – Information about changes applied to your tenant such as users and group management or updates applied to your tenant’s resources.
25
-
-**[Provisioning](concept-provisioning-logs.md)** – Activities performed by the provisioning service, such as the creation of a group in ServiceNow or a user imported from Workday.
26
-
27
25
28
26
This article gives you an overview of the provisioning logs.
29
27
30
-
31
28
## What can I do with it?
32
29
33
30
You can use the provisioning logs to find answers to questions like:
@@ -39,9 +36,9 @@ You can use the provisioning logs to find answers to questions like:
39
36
- What users from Workday were successfully created in Active Directory?
40
37
41
38
42
-
## How can I access it?
39
+
## How do you access the provisioning logs?
43
40
44
-
To view the provisioning activity report, your tenant must have an Azure AD Premium license associated with it. To upgrade your Azure AD edition, see [Getting started with Azure Active Directory Premium](../fundamentals/active-directory-get-started-premium.md).
41
+
To view the provisioning logs, your tenant must have an Azure AD Premium license associated with it. To upgrade your Azure AD edition, see [Getting started with Azure Active Directory Premium](../fundamentals/active-directory-get-started-premium.md).
45
42
46
43
Application owners can view logs for their own applications. The following roles are required to view provisioning logs:
47
44
@@ -64,61 +61,41 @@ To access the provisioning log data, you have the following options:
64
61
65
62
- Download the provisioning logs as a CSV or JSON file.
66
63
67
-
## What is the default view?
64
+
## View the provisioning logs
68
65
69
-
A provisioning log has a default list view that shows:
66
+
To more effectively view the provisioning log, spend a few moments customizing the view for your needs. You can specify what columns to include and filter the data to narrow things down.
70
67
71
-
- The identity
72
-
- The action
73
-
- The source system
74
-
- The target system
75
-
- The status
76
-
- The date
68
+
### Customize the layout
77
69
78
-
You can customize the list view by selecting **Columns** on the toolbar.
70
+
The provisioning log has a default view, but you can customize columns.
71
+
72
+
1. Select **Columns** from the menu at the top of the log.
73
+
1. Select the columns you want to view and select the **Save** button at the bottom of the window.
79
74
80
75

81
76
82
77
This area enables you to display more fields or remove fields that are already displayed.
83
78
84
-

85
-
86
-
Select an item from the list to get more detailed information, such as the steps taken to provision the user and tips for troubleshooting issues.
87
-
88
-

89
-
90
-
91
-
## Filter provisioning activities
79
+
## Filter the results
92
80
93
81
When you filter your provisioning data, some filter values are dynamically populated based on your tenant. For example, if you don't have any "create" events in your tenant, there won't be a **Create** filter option.
94
82
95
-
In the default view, you can select the following filters:
96
-
97
-
- Identity
98
-
- Date
99
-
- Status
100
-
- Action
101
-
102
-

103
-
104
83
The **Identity** filter enables you to specify the name or the identity that you care about. This identity might be a user, group, role, or other object.
105
84
106
-
You can search by the name or ID of the object. The ID varies by scenario. For example, when you're provisioning an object from Azure AD to Salesforce, the source ID is the object ID of the user in Azure AD.
107
-
The target ID is the ID of the user at Salesforce. When you're provisioning from Workday to Active Directory, the source ID is the Workday worker employee ID.
85
+
You can search by the name or ID of the object. The ID varies by scenario.
86
+
- If you're provisioning an object *from Azure AD to Salesforce*, the **source ID** is the object ID of the user in Azure AD. The **target ID** is the ID of the user at Salesforce.
87
+
- If you're provisioning *from Workday to Azure AD*, the **source ID** is the Workday worker employee ID. The **target ID** is the ID of the user in Azure AD.
108
88
109
89
> [!NOTE]
110
90
> The name of the user might not always be present in the **Identity** column. There will always be one ID.
111
91
112
-
113
92
The **Date** filter enables to you to define a timeframe for the returned data. Possible values are:
114
93
115
94
- One month
116
95
- Seven days
117
96
- 30 days
118
97
- 24 hours
119
-
- Custom time interval
120
-
121
-
When you select a custom time frame, you can configure a start date and an end date.
98
+
- Custom time interval (configure a start date and an end date)
122
99
123
100
The **Status** filter enables you to select:
124
101
@@ -137,8 +114,6 @@ The **Action** filter enables you to filter these actions:
137
114
138
115
In addition to the filters of the default view, you can set the following filters.
139
116
140
-

141
-
142
117
-**Job ID**: A unique job ID is associated with each application that you've enabled provisioning for.
143
118
144
119
-**Cycle ID**: The cycle ID uniquely identifies the provisioning cycle. You can share this ID with product support to look up the cycle in which this event occurred.
@@ -151,11 +126,9 @@ In addition to the filters of the default view, you can set the following filter
151
126
152
127
-**Application**: You can show only records of applications with a display name that contains a specific string.
153
128
154
-
## Provisioning details
155
-
156
-
When you select an item in the provisioning list view, you get more details about this item. The details are grouped into the following tabs.
129
+
## Analyze the provisioning logs
157
130
158
-

131
+
When you select an item in the provisioning list view, you get more details about this item, such as the steps taken to provision the user and tips for troubleshooting issues. The details are grouped into four tabs.
159
132
160
133
-**Steps**: Outlines the steps taken to provision an object. Provisioning an object can consist of four steps:
161
134
@@ -236,15 +209,15 @@ Use the following table to better understand how to resolve errors that you find
236
209
237
210
|Error code|Description|
238
211
|---|---|
239
-
|Conflict,EntryConflict|Correct the conflicting attribute values in either Azure AD or the application. Or, review your matching attribute configuration if the conflicting user account was supposed to be matched and taken over. Review the [documentation](../app-provisioning/customize-application-attributes.md) for more information on configuring matching attributes.|
212
+
|Conflict,<br>EntryConflict|Correct the conflicting attribute values in either Azure AD or the application. Or, review your matching attribute configuration if the conflicting user account was supposed to be matched and taken over. Review the [documentation](../app-provisioning/customize-application-attributes.md) for more information on configuring matching attributes.|
240
213
|TooManyRequests|The target app rejected this attempt to update the user because it's overloaded and receiving too many requests. There's nothing to do. This attempt will automatically be retired. Microsoft has also been notified of this issue.|
241
214
|InternalServerError |The target app returned an unexpected error. A service issue with the target application might be preventing it from working. This attempt will automatically be retried in 40 minutes.|
242
-
|InsufficientRights,MethodNotAllowed,NotPermitted,Unauthorized| Azure AD authenticated with the target application but wasn't authorized to perform the update. Review any instructions that the target application has provided, along with the respective application [tutorial](../saas-apps/tutorial-list.md).|
215
+
|InsufficientRights,<br>MethodNotAllowed,<br>NotPermitted,<br>Unauthorized| Azure AD authenticated with the target application but wasn't authorized to perform the update. Review any instructions that the target application has provided, along with the respective application [tutorial](../saas-apps/tutorial-list.md).|
243
216
|UnprocessableEntity|The target application returned an unexpected response. The configuration of the target application might not be correct, or a service issue with the target application might be preventing it from working.|
244
217
|WebExceptionProtocolError |An HTTP protocol error occurred in connecting to the target application. There's nothing to do. This attempt will automatically be retried in 40 minutes.|
245
218
|InvalidAnchor|A user that was previously created or matched by the provisioning service no longer exists. Ensure that the user exists. To force a new matching of all users, use the Microsoft Graph API to [restart the job](/graph/api/synchronization-synchronizationjob-restart?tabs=http&view=graph-rest-beta&preserve-view=true). <br><br>Restarting provisioning will trigger an initial cycle, which can take time to complete. Restarting provisioning also deletes the cache that the provisioning service uses to operate. That means all users and groups in the tenant will have to be evaluated again, and certain provisioning events might be dropped.|
246
219
|NotImplemented | The target app returned an unexpected response. The configuration of the app might not be correct, or a service issue with the target app might be preventing it from working. Review any instructions that the target application has provided, along with the respective application [tutorial](../saas-apps/tutorial-list.md). |
247
-
|MandatoryFieldsMissing,MissingValues |The user couldn't be created because required values are missing. Correct the missing attribute values in the source record, or review your matching attribute configuration to ensure that the required fields aren't omitted. [Learn more](../app-provisioning/customize-application-attributes.md) about configuring matching attributes.|
220
+
|MandatoryFieldsMissing,<br>MissingValues |The user couldn't be created because required values are missing. Correct the missing attribute values in the source record, or review your matching attribute configuration to ensure that the required fields aren't omitted. [Learn more](../app-provisioning/customize-application-attributes.md) about configuring matching attributes.|
248
221
|SchemaAttributeNotFound |The operation couldn't be performed because an attribute was specified that doesn't exist in the target application. See the [documentation](../app-provisioning/customize-application-attributes.md) on attribute customization and ensure that your configuration is correct.|
249
222
|InternalError |An internal service error occurred within the Azure AD provisioning service. There's nothing to do. This attempt will automatically be retried in 40 minutes.|
250
223
|InvalidDomain |The operation couldn't be performed because an attribute value contains an invalid domain name. Update the domain name on the user or add it to the permitted list in the target application. |
@@ -254,8 +227,8 @@ Use the following table to better understand how to resolve errors that you find
254
227
|DuplicateSourceEntries | The operation couldn't be completed because more than one user was found with the configured matching attributes. Remove the duplicate user, or [reconfigure your attribute mappings](../app-provisioning/customize-application-attributes.md).|
255
228
|ImportSkipped | When each user is evaluated, the system tries to import the user from the source system. This error commonly occurs when the user who's being imported is missing the matching property defined in your attribute mappings. Without a value present on the user object for the matching attribute, the system can't evaluate scoping, matching, or export changes. The presence of this error doesn't indicate that the user is in scope, because you haven't yet evaluated scoping for the user.|
256
229
|EntrySynchronizationSkipped | The provisioning service has successfully queried the source system and identified the user. No further action was taken on the user and they were skipped. The user might have been out of scope, or the user might have already existed in the target system with no further changes required.|
257
-
|SystemForCrossDomainIdentityManagementMultipleEntriesInResponse| A GET request to retrieve a user or group received multiple users or groups in the response. The system expects to receive only one user or group in the response. For example, if you do a [GET Group request](../app-provisioning/use-scim-to-provision-users-and-groups.md#get-group) to retrieve a group, provide a filter to exclude members, and your System for Cross-Domain Identity Management (SCIM) endpoint returns the members, you'll get this error.|
258
-
|SystemForCrossDomainIdentityManagementServiceIncompatible|The Azure AD provisioning service is unable to parse the response from the third party application. Work with the application developer to ensure that the SCIM server is compatible with the [Azure AD SCIM client](../app-provisioning/use-scim-to-provision-users-and-groups.md#understand-the-azure-ad-scim-implementation).|
230
+
|SystemForCrossDomainIdentity<br>ManagementMultipleEntriesInResponse| A GET request to retrieve a user or group received multiple users or groups in the response. The system expects to receive only one user or group in the response. For example, if you do a [GET Group request](../app-provisioning/use-scim-to-provision-users-and-groups.md#get-group) to retrieve a group, provide a filter to exclude members, and your System for Cross-Domain Identity Management (SCIM) endpoint returns the members, you'll get this error.|
231
+
|SystemForCrossDomainIdentity<br>ManagementServiceIncompatible|The Azure AD provisioning service is unable to parse the response from the third party application. Work with the application developer to ensure that the SCIM server is compatible with the [Azure AD SCIM client](../app-provisioning/use-scim-to-provision-users-and-groups.md#understand-the-azure-ad-scim-implementation).|
259
232
|SchemaPropertyCanOnlyAcceptValue|The property in the target system can only accept one value, but the property in the source system has multiple. Ensure that you either map a single-valued attribute to the property that is throwing an error, update the value in the source to be single-valued, or remove the attribute from the mappings.|
0 commit comments