Skip to content

Commit 7a9b764

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into standardSSD
2 parents d124a07 + ef7bb97 commit 7a9b764

31 files changed

+221
-153
lines changed

articles/active-directory/TOC.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -112,9 +112,9 @@
112112
#### [Interpret the sign-in log schema in Azure Monitor](reports-monitoring/reference-azure-monitor-sign-ins-log-schema.md)
113113

114114
### Troubleshoot
115-
#### [Missing audit data](reports-monitoring/troubleshoot-missing-audit-data.md)
115+
#### [Missing data in Azure AD activity logs](reports-monitoring/troubleshoot-missing-audit-data.md)
116116
#### [Missing data in downloads](reports-monitoring/troubleshoot-missing-data-download.md)
117-
#### [Azure AD Activity logs content pack errors](reports-monitoring/troubleshoot-content-pack.md)
117+
#### [Azure AD activity logs content pack errors](reports-monitoring/troubleshoot-content-pack.md)
118118
#### [Errors in Azure AD Reporting API](reports-monitoring/troubleshoot-graph-api.md)
119119

120120
### [Programmatic Access](reports-monitoring/concept-reporting-api.md)
40.3 KB
Loading
44.3 KB
Loading

articles/active-directory/reports-monitoring/overview-activity-logs-in-azure-monitor.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -131,6 +131,16 @@ This section answers frequently asked questions and discusses known issues with
131131

132132
---
133133

134+
**Q: How do I integrate Azure AD activity logs with my SIEM system?**
135+
136+
**A**: You can do this in two ways:
137+
138+
- Use Azure Monitor with Event Hubs to stream logs to your SIEM system. First, [stream the logs to an event hub](quickstart-azure-monitor-stream-logs-to-event-hub.md) and then [set up your SIEM tool](quickstart-azure-monitor-stream-logs-to-event-hub.md#access-data-from-your-event-hub) with the configured event hub.
139+
140+
- Use the [Reporting Graph API](concept-reporting-api.md) to access the data, and push it into the SIEM system using your own scripts.
141+
142+
---
143+
134144
**Q: What SIEM tools are currently supported?**
135145

136146
**A**: Currently, Azure Monitor is supported by [Splunk](tutorial-integrate-activity-logs-with-splunk.md), QRadar, and [Sumo Logic](https://help.sumologic.com/Send-Data/Applications-and-Other-Data-Sources/Azure_Active_Directory). For more information about how the connectors work, see [Stream Azure monitoring data to an event hub for consumption by an external tool](../../monitoring-and-diagnostics/monitor-stream-monitoring-data-event-hubs.md).

articles/active-directory/reports-monitoring/reports-faq.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -128,6 +128,12 @@ This article includes answers to frequently asked questions about Azure Active D
128128

129129
---
130130

131+
**Q: What does the risk event "Sign-in with additional risk detected" signify?**
132+
133+
**A:** To give you an insight into all the risky sign-ins in your environment, "Sign-in with additional risk detected" functions as placeholder for sign-ins for detections that are exclusive to Azure AD Identity Protection subscribers.
134+
135+
---
136+
131137
## Conditional access
132138

133139
**Q: What's new with this feature?**

articles/active-directory/reports-monitoring/troubleshoot-missing-audit-data.md

Lines changed: 50 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22

3-
title: 'Troubleshoot: Missing data in the Azure Active Directory activity log | Microsoft Docs'
4-
description: Lists the various available reports for Azure Active Directory
3+
title: 'Troubleshoot Missing data in the Azure Active Directory activity logs | Microsoft Docs'
4+
description: Provides you with a resolution to missing data in Azure Active Directory activity logs.
55
services: active-directory
66
documentationcenter: ''
77
author: priyamohanram
@@ -21,17 +21,38 @@ ms.reviewer: dhanyahk
2121

2222
---
2323

24-
# Troubleshoot: Missing data in the Azure Active Directory activity log
24+
# Troubleshoot: Missing data in the Azure Active Directory activity logs
2525

26+
## I can't find audit logs for recent actions in the Azure portal
2627

27-
## Symptoms
28+
### Symptoms
2829

2930
I performed some actions in the Azure portal and expected to see the audit logs for those actions in the `Activity logs > Audit Logs` blade, but I can’t find them.
3031

3132
![Reporting](./media/troubleshoot-missing-audit-data/01.png)
3233

34+
### Cause
3335

34-
## Cause
36+
Actions don’t appear immediately in the activity logs. The table below enumerates our latency numbers for activity logs.
37+
38+
| Report |   | Latency (P95) | Latency (P99) |
39+
|--------|--------|---------------|---------------|
40+
| Directory audit |   | 2 mins | 5 mins |
41+
| Sign-in activity |   | 2 mins | 5 mins |
42+
43+
### Resolution
44+
45+
Wait for 15 minutes to two hours and see if the actions appear in the log. If you don’t see the logs even after two hours, please [file a support ticket](https://portal.azure.com/#blade/Microsoft_Azure_Support/HelpAndSupportBlade/newsupportrequest) and we will look into it.
46+
47+
## I can’t find recent user sign-ins in the Azure Active Directory sign-ins activity log
48+
49+
### Symptoms
50+
51+
I recently signed into the Azure portal and expected to see the sign-in logs for those actions in the `Activity logs > Sign-ins` blade, but I can’t find them.
52+
53+
![Reporting](./media/troubleshoot-missing-audit-data/02.png)
54+
55+
### Cause
3556

3657
Actions don’t appear immediately in the activity logs. The table below enumerates our latency numbers for activity logs.
3758

@@ -40,13 +61,36 @@ Actions don’t appear immediately in the activity logs. The table below enumera
4061
| Directory audit |   | 2 mins | 5 mins |
4162
| Sign-in activity |   | 2 mins | 5 mins |
4263

43-
## Resolution
64+
### Resolution
4465

4566
Wait for 15 minutes to two hours and see if the actions appear in the log. If you don’t see the logs even after two hours, please [file a support ticket](https://portal.azure.com/#blade/Microsoft_Azure_Support/HelpAndSupportBlade/newsupportrequest) and we will look into it.
4667

68+
## I can't view more than 30 days of report data in the Azure portal
69+
70+
### Symptoms
71+
72+
I can't view more than 30 days of sign-in and audit data from the Azure portal. Why?
73+
74+
![Reporting](./media/troubleshoot-missing-audit-data/03.png)
75+
76+
### Cause
77+
78+
Depending on your license, Azure Active Directory Actions stores activity reports for the following durations:
79+
80+
| Report |   | Azure AD Free | Azure AD Premium P1 | Azure AD Premium P2 |
81+
| --- | ---- | --- | --- | --- |
82+
| Directory Audit |   | 7 days | 30 days | 30 days |
83+
| Sign-in Activity |   | Not available. You can access your own sign-ins for 7 days from the individual user profile blade | 30 days | 30 days |
84+
85+
For more information, see [Azure Active Directory report retention policies](reference-reports-data-retention.md).
86+
87+
### Resolution
88+
89+
You have two options to retain the data for longer than 30 days. You can use the [Azure AD Reporting APIs](concept-reporting-api.md) to retrieve the data programmatically and store it in a database. Alternatively, you can integrate audit logs into a third party SIEM system like Splunk or SumoLogic.
4790

4891
## Next steps
4992

93+
* [Azure AD reporting retention](reference-reports-data-retention.md).
5094
* [Azure Active Directory reporting latencies](reference-reports-latencies.md).
5195
* [Azure Active Directory reporting FAQ](reports-faq.md).
5296

articles/azure-functions/functions-bindings-event-grid.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Understand how to handle Event Grid events in Azure Functions.
44
services: functions
55
documentationcenter: na
66
author: ggailey777
7-
manager: cfowler
7+
manager: jeconnoc
88
editor: ''
99
tags: ''
1010
keywords:
@@ -14,7 +14,7 @@ ms.devlang: multiple
1414
ms.topic: reference
1515
ms.tgt_pltfrm: multiple
1616
ms.workload: na
17-
ms.date: 06/08/2018
17+
ms.date: 08/20/2018
1818
ms.author: glenga
1919
---
2020

@@ -337,7 +337,7 @@ You can get the system key by using the following API (HTTP GET):
337337
http://{functionappname}.azurewebsites.net/admin/host/systemkeys/eventgridextensionconfig_extension?code={adminkey}
338338
```
339339

340-
This is an admin API, so it requires Your [admin key](functions-bindings-http-webhook.md#authorization-keys). Don't confuse the system key (for invoking an Event Grid trigger function) with the admin key (for performing administrative tasks on the function app). When you subscribe to an Event Grid topic, be sure to use the system key.
340+
This is an admin API, so it requires your function app [master key](functions-bindings-http-webhook.md#authorization-keys). Don't confuse the system key (for invoking an Event Grid trigger function) with the master key (for performing administrative tasks on the function app). When you subscribe to an Event Grid topic, be sure to use the system key.
341341

342342
Here's an example of the response that provides the system key:
343343

articles/azure-functions/functions-run-local.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -127,6 +127,7 @@ In the terminal window or from a command prompt, run the following command to cr
127127
func init MyFunctionProj
128128
```
129129
130+
When you provide a project name, a new folder with that name is created and initialized. Otherwise, the current folder is initialized.
130131
In version 2.x, when you run the command you must choose a runtime for your project. If you plan to develop JavaScript functions, choose **node**:
131132
132133
```output

articles/azure-government/documentation-government-services-monitoringandmanagement.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -163,9 +163,9 @@ The URLs for Log Analytics are different in Azure Government:
163163
| \*.ods.opinsights.azure.com |\*.ods.opinsights.azure.us |Agent communication - [configuring firewall settings](../log-analytics/log-analytics-proxy-firewall.md) |
164164
| \*.oms.opinsights.azure.com |\*.oms.opinsights.azure.us |Agent communication - [configuring firewall settings](../log-analytics/log-analytics-proxy-firewall.md) |
165165
| \*.blob.core.windows.net |\*.blob.core.usgovcloudapi.net |Agent communication - [configuring firewall settings](../log-analytics/log-analytics-proxy-firewall.md) |
166-
| portal.loganalytics.io |portal.loganalytics.us |Advanced Analytics Portal - [configuring firewall settings](../log-analytics/log-analytics-log-search-portals.md#advanced-analytics-portal) |
167-
| api.loganalytics.io |api.loganalytics.us |Advanced Analytics Portal - [configuring firewall settings](../log-analytics/log-analytics-log-search-portals.md#advanced-analytics-portal) |
168-
| docs.loganalytics.io |docs.loganalytics.us |Advanced Analytics Portal - [configuring firewall settings](../log-analytics/log-analytics-log-search-portals.md#advanced-analytics-portal) |
166+
| portal.loganalytics.io |portal.loganalytics.us |Advanced Analytics Portal - [configuring firewall settings](../log-analytics/log-analytics-log-search-portals.md#log-analytics-page-preview) |
167+
| api.loganalytics.io |api.loganalytics.us |Advanced Analytics Portal - [configuring firewall settings](../log-analytics/log-analytics-log-search-portals.md#log-analytics-page-preview) |
168+
| docs.loganalytics.io |docs.loganalytics.us |Advanced Analytics Portal - [configuring firewall settings](../log-analytics/log-analytics-log-search-portals.md#log-analytics-page-preview) |
169169
| \*.azure-automation.net |\*.azure-automation.us |Azure Automation - [configuring firewall settings](../log-analytics/log-analytics-concept-hybrid.md#network-firewall-requirements) |
170170
| N/A | *.usgovtrafficmanager.net | Azure Traffic Manager - [configuring firewall settings](../log-analytics/log-analytics-concept-hybrid.md#network-firewall-requirements) |
171171

articles/azure-stack/azure-stack-app-service-release-notes-update-three.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.workload: na
1313
ms.tgt_pltfrm: na
1414
ms.devlang: na
1515
ms.topic: article
16-
ms.date: 08/15/2018
16+
ms.date: 08/20/2018
1717
ms.author: anwestg
1818
ms.reviewer: brenduns
1919

@@ -66,6 +66,10 @@ Azure App Service on Azure Stack Update 3 includes the following improvements an
6666
- Added Wincache 2.0.0.8
6767
- Updated Git for Windows to v 2.17.1.2
6868
- Updated Kudu to 74.10611.3437
69+
70+
- **Updates to underlying operating system of all roles**:
71+
- [Servicing stack update for Windows Server 2016 for x64-based Systems (KB4132216)](https://support.microsoft.com/help/4132216/servicing-stack-update-for-windows-10-1607-may-17-2018)
72+
- [2018-07 Cumulative Update for Windows Server 2016 for x64-based Systems (KB4338822)](https://support.microsoft.com/help/4338822/windows-10-update-kb4338822)
6973

7074
### Post Update Steps (optional)
7175

0 commit comments

Comments
 (0)