You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/role-based-access-control/elevate-access-global-admin.md
+41-4Lines changed: 41 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: rolyon
5
5
manager: amycolannino
6
6
ms.service: role-based-access-control
7
7
ms.topic: how-to
8
-
ms.date: 12/10/2024
8
+
ms.date: 01/22/2025
9
9
ms.author: rolyon
10
10
ms.custom: devx-track-azurecli
11
11
---
@@ -383,9 +383,44 @@ If you have users with elevated access, you should take immediate action and rem
383
383
384
384
1. To remove elevated access for users, add a check mark next to the user and select **Remove**.
385
385
386
-
## View elevate access log entries in the Directory Activity logs
386
+
## View elevate access log entries
387
387
388
-
When access is elevated, an entry is added to the logs. As a Global Administrator in Microsoft Entra ID, you might want to check when access was elevated and who did it. Elevate access log entries do not appear in the standard activity logs, but instead appear in the Directory Activity logs. This section describes different ways that you can view the elevate access log entries.
388
+
When access is elevated or removed, an entry is added to the logs. As an administrator in Microsoft Entra ID, you might want to check when access was elevated and who did it.
389
+
390
+
Elevate access log entries appear in both the Microsoft Entra directory audit logs and the Azure activity logs. Elevated access log entries for directory audit logs and activity logs include similar information. However, the directory audit logs are easier to filter and export. Also, the export capability enables you to stream access events, which can be used for your alert and detection solutions, such as Microsoft Sentinel or other systems. For information about how to send logs to different destinations, see [Configure Microsoft Entra diagnostic settings for activity logs](/entra/identity/monitoring-health/howto-configure-diagnostic-settings).
391
+
392
+
This section describes different ways that you can view the elevate access log entries.
> Elevate access log entries in the Microsoft Entra directory audit logs is currently in preview.
398
+
> This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
399
+
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
400
+
401
+
1. Sign in to the [Azure portal](https://portal.azure.com) as a Global Administrator.
1. In the **Service** filter, select **Azure RBAC (Elevated Access)** and then select **Apply**.
406
+
407
+
Elevated access logs are displayed.
408
+
409
+
:::image type="content" source="./media/elevate-access-global-admin/entra-id-audit-logs-filter.png" alt-text="Screenshot of directory audit logs with Service filter set to Azure RBAC (Elevated Access)." lightbox="./media/elevate-access-global-admin/entra-id-audit-logs-filter.png":::
410
+
411
+
1. To view details when access was elevated or removed, select these audit log entries.
412
+
413
+
`User has elevated their access to User Access Administrator for their Azure Resources`
414
+
415
+
`The role assignment of User Access Administrator has been removed from the user`
416
+
417
+
:::image type="content" source="./media/elevate-access-global-admin/entra-id-audit-logs-elevated-details.png" alt-text="Screenshot of directory audit logs that shows audit log details when access is elevated." lightbox="./media/elevate-access-global-admin/entra-id-audit-logs-elevated-details.png":::
418
+
419
+
1. To download and view the payload of the log entries in JSON format, select **Download** and **JSON**.
420
+
421
+
:::image type="content" source="./media/elevate-access-global-admin/entra-id-audit-logs-download.png" alt-text="Screenshot of directory audit logs that shows the Download Audit Logs pane to download logs." lightbox="./media/elevate-access-global-admin/entra-id-audit-logs-download.png":::
422
+
423
+
# [Azure activity logs](#tab/azure-activity-logs)
389
424
390
425
### View elevate access log entries using the Azure portal
391
426
@@ -399,7 +434,7 @@ When access is elevated, an entry is added to the logs. As a Global Administrato
399
434
400
435
`Assigns the caller to User Access Administrator role`
401
436
402
-

437
+

403
438
404
439
### View elevate access log entries using Azure CLI
405
440
@@ -458,6 +493,8 @@ A user in the group can now periodically run the [az rest](/cli/azure/reference-
458
493
az rest --url "https://management.azure.com/providers/Microsoft.Insights/eventtypes/management/values?api-version=2015-04-01&$filter=eventTimestamp ge '2021-09-10T20:00:00Z'" > output.txt
459
494
```
460
495
496
+
---
497
+
461
498
## Next steps
462
499
463
500
-[Understand the different roles](rbac-and-directory-admin-roles.md)
0 commit comments