Skip to content

Commit 88b2272

Browse files
authored
Merge pull request #290498 from rolyon/rolyon-rbac-elevate-access-audit-logs-preview
[Azure RBAC] View elevate access log entries in the Directory audit logs (preview)
2 parents 40f042f + 5dc7bf6 commit 88b2272

File tree

4 files changed

+41
-4
lines changed

4 files changed

+41
-4
lines changed

articles/role-based-access-control/elevate-access-global-admin.md

Lines changed: 41 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: rolyon
55
manager: amycolannino
66
ms.service: role-based-access-control
77
ms.topic: how-to
8-
ms.date: 12/10/2024
8+
ms.date: 01/22/2025
99
ms.author: rolyon
1010
ms.custom: devx-track-azurecli
1111
---
@@ -383,9 +383,44 @@ If you have users with elevated access, you should take immediate action and rem
383383
384384
1. To remove elevated access for users, add a check mark next to the user and select **Remove**.
385385
386-
## View elevate access log entries in the Directory Activity logs
386+
## View elevate access log entries
387387
388-
When access is elevated, an entry is added to the logs. As a Global Administrator in Microsoft Entra ID, you might want to check when access was elevated and who did it. Elevate access log entries do not appear in the standard activity logs, but instead appear in the Directory Activity logs. This section describes different ways that you can view the elevate access log entries.
388+
When access is elevated or removed, an entry is added to the logs. As an administrator in Microsoft Entra ID, you might want to check when access was elevated and who did it.
389+
390+
Elevate access log entries appear in both the Microsoft Entra directory audit logs and the Azure activity logs. Elevated access log entries for directory audit logs and activity logs include similar information. However, the directory audit logs are easier to filter and export. Also, the export capability enables you to stream access events, which can be used for your alert and detection solutions, such as Microsoft Sentinel or other systems. For information about how to send logs to different destinations, see [Configure Microsoft Entra diagnostic settings for activity logs](/entra/identity/monitoring-health/howto-configure-diagnostic-settings).
391+
392+
This section describes different ways that you can view the elevate access log entries.
393+
394+
# [Microsoft Entra audit logs](#tab/entra-audit-logs)
395+
396+
> [!IMPORTANT]
397+
> Elevate access log entries in the Microsoft Entra directory audit logs is currently in preview.
398+
> This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
399+
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
400+
401+
1. Sign in to the [Azure portal](https://portal.azure.com) as a Global Administrator.
402+
403+
1. Browse to **Microsoft Entra ID** > **Monitoring** > **Audit logs**.
404+
405+
1. In the **Service** filter, select **Azure RBAC (Elevated Access)** and then select **Apply**.
406+
407+
Elevated access logs are displayed.
408+
409+
:::image type="content" source="./media/elevate-access-global-admin/entra-id-audit-logs-filter.png" alt-text="Screenshot of directory audit logs with Service filter set to Azure RBAC (Elevated Access)." lightbox="./media/elevate-access-global-admin/entra-id-audit-logs-filter.png":::
410+
411+
1. To view details when access was elevated or removed, select these audit log entries.
412+
413+
`User has elevated their access to User Access Administrator for their Azure Resources`
414+
415+
`The role assignment of User Access Administrator has been removed from the user`
416+
417+
:::image type="content" source="./media/elevate-access-global-admin/entra-id-audit-logs-elevated-details.png" alt-text="Screenshot of directory audit logs that shows audit log details when access is elevated." lightbox="./media/elevate-access-global-admin/entra-id-audit-logs-elevated-details.png":::
418+
419+
1. To download and view the payload of the log entries in JSON format, select **Download** and **JSON**.
420+
421+
:::image type="content" source="./media/elevate-access-global-admin/entra-id-audit-logs-download.png" alt-text="Screenshot of directory audit logs that shows the Download Audit Logs pane to download logs." lightbox="./media/elevate-access-global-admin/entra-id-audit-logs-download.png":::
422+
423+
# [Azure activity logs](#tab/azure-activity-logs)
389424
390425
### View elevate access log entries using the Azure portal
391426
@@ -399,7 +434,7 @@ When access is elevated, an entry is added to the logs. As a Global Administrato
399434
400435
`Assigns the caller to User Access Administrator role`
401436
402-
![Screenshot showing directory activity logs in Monitor.](./media/elevate-access-global-admin/monitor-directory-activity.png)
437+
![Screenshot that shows activity logs for the directory in Azure Monitor.](./media/elevate-access-global-admin/monitor-directory-activity.png)
403438
404439
### View elevate access log entries using Azure CLI
405440
@@ -458,6 +493,8 @@ A user in the group can now periodically run the [az rest](/cli/azure/reference-
458493
az rest --url "https://management.azure.com/providers/Microsoft.Insights/eventtypes/management/values?api-version=2015-04-01&$filter=eventTimestamp ge '2021-09-10T20:00:00Z'" > output.txt
459494
```
460495

496+
---
497+
461498
## Next steps
462499

463500
- [Understand the different roles](rbac-and-directory-admin-roles.md)
66.1 KB
Loading
120 KB
Loading
72.5 KB
Loading

0 commit comments

Comments
 (0)