You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/privileged-identity-management/pim-how-to-use-audit-log.md
+33-27Lines changed: 33 additions & 27 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,54 +11,60 @@ ms.service: active-directory
11
11
ms.topic: conceptual
12
12
ms.workload: identity
13
13
ms.subservice: pim
14
-
ms.date: 02/14/2017
14
+
ms.date: 06/10/2019
15
15
ms.author: rolyon
16
16
ms.custom: pim
17
17
18
18
ms.collection: M365-identity-device-management
19
19
---
20
20
# View audit history for Azure AD roles in PIM
21
-
You can use the Azure Active Directory (Azure AD) Privileged Identity Management (PIM) audit history to see all the user assignments and activations within a given time period for all privileged roles. If you want to see the full audit history of activity in your tenant, including administrator, end user, and synchronization activity, you can use the [Azure Active Directory access and usage reports.](../reports-monitoring/overview-reports.md)
22
21
23
-
## Navigate to audit history
24
-
From the [Azure portal](https://portal.azure.com) dashboard, select the **Azure AD Privileged Identity Management** app. From there, access the audit history by clicking **Manage privileged roles** > **Audit history** in the PIM dashboard.
22
+
You can use the Azure Active Directory (Azure AD) Privileged Identity Management (PIM) audit history to see all the role assignments and activations within the past 30 days for all privileged roles. If you want to see the full audit history of activity in your directory, including administrator, end user, and synchronization activity, you can use the [Azure Active Directory security and activity reports](../reports-monitoring/overview-reports.md).
> You can sort the data by Action, and look for “Activation Approved”
26
+
Follow these steps to view the audit history for Azure AD roles.
30
27
28
+
1. Sign in to [Azure portal](https://portal.azure.com/) with a user that is a member of the [Privileged Role Administrator](../users-groups-roles/directory-assign-admin-roles.md#privileged-role-administrator) role.
31
29
32
-
## Audit history graph
33
-
You can use the audit history to view the total activations, max activations per day, and average activations per day in a line graph. You can also filter the data by role if there is more than one role in the audit history.
30
+
1. Open **Azure AD Privileged Identity Management**.
34
31
35
-
Use the**time**, **action**, and **role** buttons to sort the history.
32
+
1. Click**Azure AD roles**.
36
33
37
-
## Audit history list
38
-
The columns in the audit history list are:
34
+
1. Click **Directory roles audit history**.
39
35
40
-
***Requestor** - the user who requested the role activation or change. If the value is "Azure System", check the Azure audit history for more information.
41
-
***User** - the user who is activating or assigned to a role.
42
-
***Role** - the role assigned or activated by the user.
43
-
***Action** - the actions taken by the requestor. This can include assignment, unassignment, activation, or deactivation.
44
-
***Time** - when the action occurred.
45
-
***Reasoning** - if any text was entered into the reason field during activation, it will show up here.
46
-
***Expiration** - only relevant for activation of roles.
36
+
You can view the total activations, max activations per day, and average activations per day in a column chart. You can also filter the data by role if there is more than one role in the audit history.
1. Click the **Time**, **Action**, and **Role** buttons to sort the history.
41
+
42
+
The columns at the bottom of the page have the following meanings:
43
+
44
+
| Column | Description |
45
+
| --- | --- |
46
+
| Time | When the action occurred. |
47
+
| Requestor | User who requested the role activation or change. If the value is **Azure System**, check the Azure audit history for more information. |
48
+
| Action | Actions taken by the requestor. Actions can include Assign, Unassign, Activate, Deactivate, or AddedOutsidePIM. |
49
+
| Member | User who is activating or assigned to a role. |
50
+
| Role | Role assigned or activated by the user. |
51
+
| Reasoning | Any text that was entered into the reason field during activation. |
52
+
| Expiration | Only relevant for activation of roles. |
47
53
48
54
## Filter audit history
49
-
You can filter the information that shows up in the audit history by clicking the **Filter** button. The **Update chart parameters blade** will appear.
50
55
51
-
After you set the filters, click **Update** to filter the data in the history. If the data doesn't appear right away, refresh the page.
56
+
1. At the top of the audit history page, click the **Filter** button.
57
+
58
+
The **Update chart parameters** pane appears.
59
+
60
+
1. In **Time range**, click a time range.
52
61
53
-
### Change the date range
54
-
Use the **Today**, **Past Week**, **Past Month**, or **Custom** buttons to change the time range of the audit history.
62
+
1. In **Roles**, add checkmarks for the roles you want to view.
55
63
56
-
When you choose the **Custom** button, you will be given a **From** date field and a **To** date field to specify a range of dates for the history. You can either enter the dates in MM/DD/YYYY format or click on the **calendar** icon and choose the date from a calendar.
0 commit comments