Skip to content

Commit 87f529b

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents b24a8cb + 4935fcb commit 87f529b

File tree

1 file changed

+16
-12
lines changed

1 file changed

+16
-12
lines changed

articles/sentinel/connect-azure-active-directory.md

Lines changed: 16 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Send Microsoft Entra ID data to Microsoft Sentinel
33
description: Learn how to collect data from Microsoft Entra ID, and stream Microsoft Entra sign-in, audit, and provisioning logs into Microsoft Sentinel.
44
author: guywi-ms
55
ms.topic: how-to
6-
ms.date: 03/16/2025
6+
ms.date: 07/03/2025
77
ms.author: guywild
88

99

@@ -13,11 +13,24 @@ ms.author: guywild
1313

1414
# Send data to Microsoft Sentinel using the Microsoft Entra ID data connector
1515

16-
[Microsoft Entra ID](/entra/fundamentals/what-is-entra) logs provide comprehensive information about users, applications, and networks accessing your Entra tenant. This article explains the types of logs you can collect using the Microsoft Entra ID data connector, how to enable the connector to send data to Microsoft Sentinel, and how to find your data in Microsoft Sentinel.
16+
[Microsoft Entra ID](/entra/fundamentals/what-is-entra) logs provide comprehensive information about users, applications, and networks accessing your Microsoft Entra tenant. This article explains the types of logs you can collect using the Microsoft Entra ID data connector, how to enable the connector to send data to Microsoft Sentinel, and how to find your data in Microsoft Sentinel.
17+
18+
19+
## Prerequisites
20+
21+
- A Microsoft Entra Workload ID Premium license is required to stream **[AADRiskyServicePrincipals](/azure/azure-monitor/reference/tables/aadriskyserviceprincipals)** and **[AADServicePrincipalRiskEvents](/azure/azure-monitor/reference/tables/aadserviceprincipalriskevents)** logs to Microsoft Sentinel.
22+
23+
- A Microsoft Entra ID P1 or P2 license is required to ingest sign-in logs into Microsoft Sentinel. Any Microsoft Entra ID license (Free/O365/P1 or P2) is sufficient to ingest the other log types. Other per-gigabyte charges might apply for Azure Monitor (Log Analytics) and Microsoft Sentinel.
24+
25+
- Your user must be assigned the [Microsoft Sentinel Contributor](../role-based-access-control/built-in-roles.md#microsoft-sentinel-contributor) role on the workspace.
26+
27+
- Your user must have the [Security Administrator](../active-directory/roles/permissions-reference.md#security-administrator) role on the tenant you want to stream the logs from, or the equivalent permissions.
28+
29+
- Your user must have read and write permissions to the Microsoft Entra diagnostic settings in order to be able to see the connection status.
1730

1831
## Microsoft Entra ID data connector data types
1932

20-
This table lists the logs you can send from Microsoft Entra ID to Microsoft Sentinel using the Microsoft Entra ID data connector. Sentinel stores these logs in the Log Analytics workspace linked to your Microsoft Sentinel workspace.
33+
This table lists the logs you can send from Microsoft Entra ID to Microsoft Sentinel using the Microsoft Entra ID data connector. Microsoft Sentinel stores these logs in the Log Analytics workspace linked to your Microsoft Sentinel workspace.
2134

2235
| **Log type** | **Description** | **Log schema** |
2336
|--------------|-----------------------------------|----------------|
@@ -42,15 +55,6 @@ This table lists the logs you can send from Microsoft Entra ID to Microsoft Sent
4255
4356
[!INCLUDE [reference-to-feature-availability](includes/reference-to-feature-availability.md)]
4457

45-
## Prerequisites
46-
47-
- A Microsoft Entra ID P1 or P2 license is required to ingest sign-in logs into Microsoft Sentinel. Any Microsoft Entra ID license (Free/O365/P1 or P2) is sufficient to ingest the other log types. Other per-gigabyte charges might apply for Azure Monitor (Log Analytics) and Microsoft Sentinel.
48-
49-
- Your user must be assigned the [Microsoft Sentinel Contributor](../role-based-access-control/built-in-roles.md#microsoft-sentinel-contributor) role on the workspace.
50-
51-
- Your user must have the [Security Administrator](../active-directory/roles/permissions-reference.md#security-administrator) role on the tenant you want to stream the logs from, or the equivalent permissions.
52-
53-
- Your user must have read and write permissions to the Microsoft Entra diagnostic settings in order to be able to see the connection status.
5458

5559
<a name='connect-to-azure-active-directory'></a>
5660

0 commit comments

Comments
 (0)