You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-infrastructure-entitlement-management/onboard-azure.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ ms.author: jfields
17
17
This article describes how to onboard a Microsoft Azure subscription or subscriptions on Permissions Management. Onboarding a subscription creates a new authorization system to represent the Azure subscription in Permissions Management.
18
18
19
19
> [!NOTE]
20
-
> A *global administrator* or *super admin* (an admin for all authorization system types) can perform the tasks in this article after the global administrator has initially completed the steps provided in [Enable Permissions Management on your Azure Active Directory tenant](onboard-enable-tenant.md).
20
+
> A *global administrator* or *root user* (an admin for all authorization system types) can perform the tasks in this article after the global administrator has initially completed the steps provided in [Enable Permissions Management on your Azure Active Directory tenant](onboard-enable-tenant.md).
You may have received a notification email that says that your [Azure AD Connect version is deprecated](whatis-azure-ad-connect-v2.md) and no longer supported. Or, you may have read a portal recommendation about upgrading your Azure AD Connect version. What is next?
Using a deprecated and unsupported version of Azure AD Connect isn't recommended and not supported. Deprecated and unsupported versions of Azure AD Connect may **unexpectedly stop working**. In these instances, you may need to install the latest version of Azure AD Connect as your only remedy to restore your sync process.
24
26
25
27
We regularly update Azure AD Connect with [newer versions](reference-connect-version-history.md). The new versions have bug fixes, performance improvements, new functionality, and security fixes, so it's important to stay up to date.
This topic describes the different methods that you can use to upgrade your Azure Active Directory (Azure AD) Connect installation to the latest release. Microsoft recommends using the steps in the [Swing migration](#swing-migration) section when you make a substantial configuration change or upgrade from older 1.x versions.
Azure AD Connect was released several years ago. Since this time, several of the components that Azure AD Connect uses have been scheduled for deprecation and updated to newer versions. Attempting to update all of these components individually would take time and planning.
To address this, we've bundled as many of these newer components into a new, single release, so you only have to update once. This release is Azure AD Connect V2. This release is a new version of the same software used to accomplish your hybrid identity goals, built using the latest foundational components.
Azure AD Connect is an on-premises Microsoft application that's designed to meet and accomplish your hybrid identity goals. If you're evaluating how to best meet your goals, you should also consider the cloud-managed solution [Azure AD Connect cloud sync](../cloud-sync/what-is-cloud-sync.md).
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/concept-activity-logs-azure-monitor.md
+9-21Lines changed: 9 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.topic: conceptual
9
9
ms.workload: identity
10
10
ms.subservice: report-monitor
11
-
ms.date: 01/12/2023
11
+
ms.date: 02/03/2023
12
12
ms.author: sarahlipsey
13
13
ms.reviewer: besiler
14
14
ms.collection: M365-identity-device-management
@@ -51,17 +51,17 @@ Depending on where you want to route the audit log data, you also need one of th
51
51
- For storage pricing information, see the [Azure Storage pricing calculator](https://azure.microsoft.com/pricing/calculator/?service=storage).
52
52
* An **[Azure Event Hubs namespace](../../event-hubs/event-hubs-create.md)** to integrate with third-party solutions.
53
53
54
-
Once you have your endpoint established, go to **Azure AD** and then **Diagnostic settings.** From here you can choose what logs to send to the endpoint of your choice. For more information, see the **Create diagnostic settings** section of the [Diagnostic settings in Azure Monitor](../../azure-monitor/essentials/diagnostic-settings.md#create-diagnostic-settings) article.
54
+
Once you have your endpoint established, go to **Azure AD** and then **Diagnostic settings.** From here, you can choose what logs to send to the endpoint of your choice. For more information, see the **Create diagnostic settings** section of the [Diagnostic settings in Azure Monitor](../../azure-monitor/essentials/diagnostic-settings.md#create-diagnostic-settings) article.
55
55
56
56
## Cost considerations
57
57
58
-
If you already have an Azure AD license, you need an Azure subscription to set up the storage account and Event Hubs. The Azure subscription comes at no cost, but you have to pay to utilize Azure resources, including the storage account that you use for archival and the Event Hubs that you use for streaming. The amount of data and, thus, the cost incurred, can vary significantly depending on the tenant size.
58
+
If you already have an Azure AD license, you need an Azure subscription to set up the storage account and Event Hubs. The Azure subscription comes at no cost, but you have to pay to utilize Azure resources. These resources could include the storage account that you use for archival and the Event Hubs that you use for streaming. The amount of data and, thus, the cost incurred, can vary significantly depending on the tenant size.
59
59
60
60
Azure Monitor provides the option to exclude whole events, fields, or parts of fields when ingesting logs from Azure AD. Learn more about this cost saving feature in [Data collection transformation in Azure Monitor](../../azure-monitor/essentials/data-collection-transformations.md).
61
61
62
62
### Storage size for activity logs
63
63
64
-
Every audit log event uses about 2 KB of data storage. Signin event logs are about 4 KB of data storage. For a tenant with 100,000 users, which would incur about 1.5 million events per day, you would need about 3 GB of data storage per day. Because writes occur in approximately five-minute batches, you can anticipate approximately 9,000 write operations per month.
64
+
Every audit log event uses about 2 KB of data storage. Sign-in event logs are about 4 KB of data storage. For a tenant with 100,000 users, which would incur about 1.5 million events per day, you would need about 3 GB of data storage per day. Because writes occur in approximately five-minute batches, you can anticipate around 9,000 write operations per month.
65
65
66
66
The following table contains a cost estimate of, depending on the size of the tenant, a general-purpose v2 storage account in West US for at least one year of retention. To create a more accurate estimate for the data volume that you anticipate for your application, use the [Azure storage pricing calculator](https://azure.microsoft.com/pricing/details/storage/blobs/).
67
67
@@ -80,9 +80,9 @@ If you want to know for how long the activity data is stored in a Premium tenant
80
80
81
81
Events are batched into approximately five-minute intervals and sent as a single message that contains all the events within that timeframe. A message in the Event Hubs has a maximum size of 256 KB. If the total size of all the messages within the timeframe exceeds that volume, multiple messages are sent.
82
82
83
-
For example, about 18 events per second ordinarily occur for a large tenant of more than 100,000 users, a rate that equates to 5,400 events every five minutes. Because audit logs are about 2 KB per event, this equates to 10.8 MB of data. Therefore, 43 messages are sent to the event hub in that five-minute interval.
83
+
For example, about 18 events per second ordinarily occur for a large tenant of more than 100,000 users, a rate that equates to 5,400 events every five minutes. Audit logs are about 2 KB per event, which equates to 10.8 MB of data. Therefore, 43 messages are sent to the event hub in that five-minute interval.
84
84
85
-
The following table contains estimated costs per month for a basic event hub in West US, depending on the volume of event data which can vary from tenant to tenant as per many factors like user sign-in behavior etc. To calculate an accurate estimate of the data volume that you anticipate for your application, use the [Event Hubs pricing calculator](https://azure.microsoft.com/pricing/details/event-hubs/).
85
+
The following table contains estimated costs per month for a basic event hub in West US. The volume of event data can vary from tenant to tenant, based on factors like user sign-in behavior. To calculate an accurate estimate of the data volume that you anticipate for your application, use the [Event Hubs pricing calculator](https://azure.microsoft.com/pricing/details/event-hubs/).
86
86
87
87
| Log category | Number of users | Events per second | Events per five-minute interval | Volume per interval | Messages per interval | Messages per month | Cost per month (est.) |
@@ -111,18 +111,6 @@ This section answers frequently asked questions and discusses known issues with
111
111
112
112
---
113
113
114
-
**Q: How soon after an action will the corresponding logs show up in my event hub?**
115
-
116
-
**A**: The logs should show up in your event hub within two to five minutes after the action is performed. For more information about Event Hubs, see [What is Azure Event Hubs?](../../event-hubs/event-hubs-about.md).
117
-
118
-
---
119
-
120
-
**Q: How soon after an action will the corresponding logs show up in my storage account?**
121
-
122
-
**A**: For Azure storage accounts, the latency is anywhere from 5 to 15 minutes after the action is performed.
123
-
124
-
---
125
-
126
114
**Q: What happens if an Administrator changes the retention period of a diagnostic setting?**
127
115
128
116
**A**: The new retention policy will be applied to logs collected after the change. Logs collected before the policy change will be unaffected.
@@ -141,11 +129,11 @@ This section answers frequently asked questions and discusses known issues with
141
129
142
130
---
143
131
144
-
**Q: How do I integrate Azure AD activity logs with my SIEM system?**
132
+
**Q: How do I integrate Azure AD activity logs with my SIEM tools?**
145
133
146
-
**A**: You can do this in two ways:
134
+
**A**: You can do integrate with your SIEM tools in two ways:
147
135
148
-
- Use Azure Monitor with Event Hubs to stream logs to your SIEM system. First, [stream the logs to an event hub](tutorial-azure-monitor-stream-logs-to-event-hub.md) and then [set up your SIEM tool](tutorial-azure-monitor-stream-logs-to-event-hub.md#access-data-from-your-event-hub) with the configured event hub.
136
+
- Use Azure Monitor with Event Hubs to stream logs to your SIEM tool. First, [stream the logs to an event hub](tutorial-azure-monitor-stream-logs-to-event-hub.md) and then [set up your SIEM tool](tutorial-azure-monitor-stream-logs-to-event-hub.md#access-data-from-your-event-hub) with the configured event hub.
149
137
150
138
- Use the [Reporting Graph API](concept-reporting-api.md) to access the data, and push it into the SIEM system using your own scripts.
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/how-to-view-applied-conditional-access-policies.md
+19-41Lines changed: 19 additions & 41 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
9
9
ms.topic: how-to
10
10
ms.workload: identity
11
11
ms.subservice: report-monitor
12
-
ms.date: 10/31/2022
12
+
ms.date: 02/03/2023
13
13
ms.author: sarahlipsey
14
14
ms.reviewer: besiler
15
15
@@ -32,41 +32,30 @@ As an Azure AD administrator, you can use the sign-in logs to:
32
32
33
33
Some scenarios require you to get an understanding of how your Conditional Access policies were applied to a sign-in event. Common examples include:
34
34
35
-
-*Helpdesk administrators* who need to look at applied Conditional Access policies to understand if a policy is the root cause of a ticket that a user opened.
35
+
- Helpdesk administrators who need to look at applied Conditional Access policies to understand if a policy is the root cause of a ticket that a user opened.
36
36
37
-
-*Tenant administrators* who need to verify that Conditional Access policies have the intended effect on the users of a tenant.
37
+
- Tenant administrators who need to verify that Conditional Access policies have the intended effect on the users of a tenant.
38
38
39
39
You can access the sign-in logs by using the Azure portal, Microsoft Graph, and PowerShell.
40
40
41
41
## Required administrator roles
42
42
43
-
To see applied Conditional Access policies in the sign-in logs, administrators must have permissions to view both the logs and the policies.
43
+
To see applied Conditional Access policies in the sign-in logs, administrators must have permissions to view *both* the logs and the policies. The least privileged built-in role that grants *both* permissions is *Security Reader*. As a best practice, your Global Administrator should add the Security Reader role to the related administrator accounts.
44
44
45
-
The least privileged built-in role that grants both permissions is *Security Reader*. As a best practice, your global administrator should add the Security Reader role to the related administrator accounts.
46
-
47
-
The following built-in roles grant permissions to read Conditional Access policies:
45
+
The following built-in roles grant permissions to *read Conditional Access policies*:
48
46
49
47
- Global Administrator
50
-
51
48
- Global Reader
52
-
53
49
- Security Administrator
54
-
55
50
- Security Reader
56
-
57
51
- Conditional Access Administrator
58
52
59
-
60
-
The following built-in roles grant permission to view sign-in logs:
53
+
The following built-in roles grant permission to *view sign-in logs*:
61
54
62
55
- Global Administrator
63
-
64
56
- Security Administrator
65
-
66
57
- Security Reader
67
-
68
58
- Global Reader
69
-
70
59
- Reports Reader
71
60
72
61
## Permissions for client apps
@@ -76,9 +65,7 @@ If you use a client app to pull sign-in logs from Microsoft Graph, your app need
76
65
Any of the following permissions is sufficient for a client app to access applied certificate authority (CA) policies in sign-in logs through Microsoft Graph:
77
66
78
67
-`Policy.Read.ConditionalAccess`
79
-
80
68
-`Policy.ReadWrite.ConditionalAccess`
81
-
82
69
-`Policy.Read.All`
83
70
84
71
## Permissions for PowerShell
@@ -89,37 +76,28 @@ Like any other client app, the Microsoft Graph PowerShell module needs client pe
89
76
-`AuditLog.Read.All`
90
77
-`Directory.Read.All`
91
78
92
-
These permissions are the least privileged permissions with the necessary access.
The following permissions are the least privileged permissions with the necessary access:
99
80
100
-
`Get-MgAuditLogSignIn`
81
+
- To consent to the necessary permissions: `Connect-MgGraph -Scopes Policy.Read.ConditionalAccess, AuditLog.Read.All, Directory.Read.All`
82
+
- To view the sign-in logs: `Get-MgAuditLogSignIn`
101
83
102
84
For more information about this cmdlet, see [Get-MgAuditLogSignIn](/powershell/module/microsoft.graph.reports/get-mgauditlogsignin).
103
85
104
86
The Azure AD Graph PowerShell module doesn't support viewing applied Conditional Access policies. Only the Microsoft Graph PowerShell module returns applied Conditional Access policies.
105
87
106
-
## Confirming access
107
-
108
-
On the **Conditional Access** tab, you see a list of Conditional Access policies applied to that sign-in event.
109
-
110
-
To confirm that you have admin access to view applied Conditional Access policies in the sign-in logs:
111
-
112
-
1. Go to the Azure portal.
113
-
114
-
2. In the upper-right corner, select your directory, and then select **Azure Active Directory** on the left pane.
88
+
## View Conditional Access policies in Azure AD sign-in logs
115
89
116
-
3. In the **Monitoring** section, select **Sign-in logs**.
90
+
The activity details of sign-in logs contain several tabs. The **Conditional Access** tab lists the Conditional Access policies applied to that sign-in event.
117
91
118
-
4. Select an item in the sign-in table to open the **Activity Details: Sign-ins context** pane.
92
+
1. Sign in to the [Azure portal](https://portal.azure.com) using the Security Reader role.
93
+
1. In the **Monitoring** section, select **Sign-in logs**.
94
+
1. Select a sign-in item from the table to open the **Activity Details: Sign-ins context** pane.
95
+
1. Select the **Conditional Access** tab.
119
96
120
-
5. Select the **Conditional Access** tab on the context pane. If your screen is small, you might need to select the ellipsis (**...**) to see all tabs on the context pane.
97
+
If you don't see the Conditional Access policies, confirm you're using a role that provides access to both the sign-in logs and the Conditional Access policies.
0 commit comments