You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/quickstart-v1-openid-connect-code.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -406,7 +406,7 @@ Sign in with either a personal Microsoft account or a work or school account, an
406
406
407
407
For reference, the completed sample (without your configuration values) [is provided as a .zip file](https://github.com/AzureADQuickStarts/WebApp-OpenIDConnect-NodeJS/archive/complete.zip). Alternatively, you can clone it from GitHub:
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/overview-activity-logs-in-azure-monitor.md
+10Lines changed: 10 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -131,6 +131,16 @@ This section answers frequently asked questions and discusses known issues with
131
131
132
132
---
133
133
134
+
**Q: How do I integrate Azure AD activity logs with my SIEM system?**
135
+
136
+
**A**: You can do this in two ways:
137
+
138
+
- Use Azure Monitor with Event Hubs to stream logs to your SIEM system. First, [stream the logs to an event hub](quickstart-azure-monitor-stream-logs-to-event-hub.md) and then [set up your SIEM tool](quickstart-azure-monitor-stream-logs-to-event-hub.md#access-data-from-your-event-hub) with the configured event hub.
139
+
140
+
- Use the [Reporting Graph API](concept-reporting-api.md) to access the data, and push it into the SIEM system using your own scripts.
141
+
142
+
---
143
+
134
144
**Q: What SIEM tools are currently supported?**
135
145
136
146
**A**: Currently, Azure Monitor is supported by [Splunk](tutorial-integrate-activity-logs-with-splunk.md), QRadar, and [Sumo Logic](https://help.sumologic.com/Send-Data/Applications-and-Other-Data-Sources/Azure_Active_Directory). For more information about how the connectors work, see [Stream Azure monitoring data to an event hub for consumption by an external tool](../../monitoring-and-diagnostics/monitor-stream-monitoring-data-event-hubs.md).
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/reports-faq.md
+6Lines changed: 6 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -128,6 +128,12 @@ This article includes answers to frequently asked questions about Azure Active D
128
128
129
129
---
130
130
131
+
**Q: What does the risk event "Sign-in with additional risk detected" signify?**
132
+
133
+
**A:** To give you an insight into all the risky sign-ins in your environment, "Sign-in with additional risk detected" functions as placeholder for sign-ins for detections that are exclusive to Azure AD Identity Protection subscribers.
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/troubleshoot-missing-audit-data.md
+50-6Lines changed: 50 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
3
-
title: 'Troubleshoot: Missing data in the Azure Active Directory activity log | Microsoft Docs'
4
-
description: Lists the various available reports for Azure Active Directory
3
+
title: 'Troubleshoot Missing data in the Azure Active Directory activity logs | Microsoft Docs'
4
+
description: Provides you with a resolution to missing data in Azure Active Directory activity logs.
5
5
services: active-directory
6
6
documentationcenter: ''
7
7
author: priyamohanram
@@ -21,17 +21,38 @@ ms.reviewer: dhanyahk
21
21
22
22
---
23
23
24
-
# Troubleshoot: Missing data in the Azure Active Directory activity log
24
+
# Troubleshoot: Missing data in the Azure Active Directory activity logs
25
25
26
+
## I can't find audit logs for recent actions in the Azure portal
26
27
27
-
## Symptoms
28
+
###Symptoms
28
29
29
30
I performed some actions in the Azure portal and expected to see the audit logs for those actions in the `Activity logs > Audit Logs` blade, but I can’t find them.
Wait for 15 minutes to two hours and see if the actions appear in the log. If you don’t see the logs even after two hours, please [file a support ticket](https://portal.azure.com/#blade/Microsoft_Azure_Support/HelpAndSupportBlade/newsupportrequest) and we will look into it.
46
+
47
+
## I can’t find recent user sign-ins in the Azure Active Directory sign-ins activity log
48
+
49
+
### Symptoms
50
+
51
+
I recently signed into the Azure portal and expected to see the sign-in logs for those actions in the `Activity logs > Sign-ins` blade, but I can’t find them.
Actions don’t appear immediately in the activity logs. The table below enumerates our latency numbers for activity logs.
37
58
@@ -40,13 +61,36 @@ Actions don’t appear immediately in the activity logs. The table below enumera
40
61
| Directory audit | | 2 mins | 5 mins |
41
62
| Sign-in activity | | 2 mins | 5 mins |
42
63
43
-
## Resolution
64
+
###Resolution
44
65
45
66
Wait for 15 minutes to two hours and see if the actions appear in the log. If you don’t see the logs even after two hours, please [file a support ticket](https://portal.azure.com/#blade/Microsoft_Azure_Support/HelpAndSupportBlade/newsupportrequest) and we will look into it.
46
67
68
+
## I can't view more than 30 days of report data in the Azure portal
69
+
70
+
### Symptoms
71
+
72
+
I can't view more than 30 days of sign-in and audit data from the Azure portal. Why?
Depending on your license, Azure Active Directory Actions stores activity reports for the following durations:
79
+
80
+
| Report | | Azure AD Free | Azure AD Premium P1 | Azure AD Premium P2 |
81
+
| --- | ---- | --- | --- | --- |
82
+
| Directory Audit | | 7 days | 30 days | 30 days |
83
+
| Sign-in Activity | | Not available. You can access your own sign-ins for 7 days from the individual user profile blade | 30 days | 30 days |
84
+
85
+
For more information, see [Azure Active Directory report retention policies](reference-reports-data-retention.md).
86
+
87
+
### Resolution
88
+
89
+
You have two options to retain the data for longer than 30 days. You can use the [Azure AD Reporting APIs](concept-reporting-api.md) to retrieve the data programmatically and store it in a database. Alternatively, you can integrate audit logs into a third party SIEM system like Splunk or SumoLogic.
47
90
48
91
## Next steps
49
92
93
+
*[Azure AD reporting retention](reference-reports-data-retention.md).
50
94
*[Azure Active Directory reporting latencies](reference-reports-latencies.md).
51
95
*[Azure Active Directory reporting FAQ](reports-faq.md).
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/dropboxforbusiness-tutorial.md
+51-52Lines changed: 51 additions & 52 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.workload: identity
14
14
ms.tgt_pltfrm: na
15
15
ms.devlang: na
16
16
ms.topic: article
17
-
ms.date: 11/29/2017
17
+
ms.date: 08/20/2018
18
18
ms.author: jeedes
19
19
20
20
---
@@ -46,30 +46,32 @@ To test the steps in this tutorial, you should follow these recommendations:
46
46
- If you don't have an Azure AD trial environment, you can [get a one-month trial](https://azure.microsoft.com/pricing/free-trial/).
47
47
48
48
## Scenario description
49
-
In this tutorial, you test Azure AD single sign-on in a test environment.
49
+
50
+
In this tutorial, you test Azure AD single sign-on in a test environment.
50
51
The scenario outlined in this tutorial consists of two main building blocks:
51
52
52
53
1. Adding Dropbox for Business from the gallery
53
-
1. Configuring and testing Azure AD single sign-on
54
+
2. Configuring and testing Azure AD single sign-on
54
55
55
56
## Adding Dropbox for Business from the gallery
57
+
56
58
To configure the integration of Dropbox for Business into Azure AD, you need to add Dropbox for Business from the gallery to your list of managed SaaS apps.
57
59
58
60
**To add Dropbox for Business from the gallery, perform the following steps:**
59
61
60
-
1. In the **[Azure portal](https://portal.azure.com)**, on the left navigation panel, click **Azure Active Directory** icon.
62
+
1. In the **[Azure portal](https://portal.azure.com)**, on the left navigation panel, click **Azure Active Directory** icon.
61
63
62
64
![The Azure Active Directory button][1]
63
65
64
-
1. Navigate to **Enterprise applications**. Then go to **All applications**.
66
+
2. Navigate to **Enterprise applications**. Then go to **All applications**.
65
67
66
68
![The Enterprise applications blade][2]
67
-
68
-
1. To add new application, click **New application** button on the top of dialog.
69
+
70
+
3. To add new application, click **New application** button on the top of dialog.
69
71
70
72
![The New application button][3]
71
73
72
-
1. In the search box, type **Dropbox for Business**, select **Dropbox for Business** from result panel then click **Add** button to add the application.
74
+
4. In the search box, type **Dropbox for Business**, select **Dropbox for Business** from result panel then click **Add** button to add the application.
73
75
74
76

75
77
@@ -84,10 +86,10 @@ In Dropbox for Business, assign the value of the **user name** in Azure AD as th
84
86
To configure and test Azure AD single sign-on with Dropbox for Business, you need to complete the following building blocks:
85
87
86
88
1.**[Configure Azure AD Single Sign-On](#configure-azure-ad-single-sign-on)** - to enable your users to use this feature.
87
-
1.**[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with Britta Simon.
88
-
1.**[Create a Dropbox for Business test user](#create-a-dropbox-for-business-test-user)** - to have a counterpart of Britta Simon in Dropbox for Business that is linked to the Azure AD representation of user.
89
-
1.**[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable Britta Simon to use Azure AD single sign-on.
90
-
1.**[Test single sign-on](#test-single-sign-on)** - to verify whether the configuration works.
89
+
2.**[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with Britta Simon.
90
+
3.**[Create a Dropbox for Business test user](#create-a-dropbox-for-business-test-user)** - to have a counterpart of Britta Simon in Dropbox for Business that is linked to the Azure AD representation of user.
91
+
4.**[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable Britta Simon to use Azure AD single sign-on.
92
+
5.**[Test single sign-on](#test-single-sign-on)** - to verify whether the configuration works.
91
93
92
94
### Configure Azure AD single sign-on
93
95
@@ -99,71 +101,68 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
99
101
100
102
![Configure single sign-on link][4]
101
103
102
-
1. On the **Single sign-on** dialog, select **Mode** as **SAML-based Sign-on** to enable single sign-on.
104
+
2. On the **Single sign-on** dialog, select **Mode** as **SAML-based Sign-on** to enable single sign-on.
1. On the **Dropbox for Business Domain and URLs** section, perform the following steps:
108
+
3. On the **Dropbox for Business Domain and URLs** section, perform the following steps:
107
109
108
110

109
111
110
112
a. In the **Sign-on URL** textbox, type a URL using the following pattern: `https://www.dropbox.com/sso/<id>`
111
113
112
114
b. In the **Identifier** textbox, type a value: `Dropbox`
113
115
114
-
> [!NOTE]
115
-
> The preceding Sign-on URL value is not real value. You will update the value with the actual Sign-on URL, which is explained later in the tutorial. Contact [Dropbox for Business Client support team](https://www.dropbox.com/business/contact) to get the value.
116
-
116
+
> [!NOTE]
117
+
> The preceding Sign-on URL value is not real value. You will update the value with the actual Sign-on URL, which is explained later in the tutorial.
117
118
118
-
1. On the **SAML Signing Certificate** section, click **Certificate (Base64)** and then save the certificate file on your computer.
119
+
4. On the **SAML Signing Certificate** section, click **Certificate (Base64)** and then save the certificate file on your computer.

125
126
126
-
1. On the **Dropbox for Business Configuration** section, click **Configure Dropbox for Business** to open **Configure sign-on** window. Copy the **SAML Single Sign-On Service URL** from the **Quick Reference section.**
127
+
6. On the **Dropbox for Business Configuration** section, click **Configure Dropbox for Business** to open **Configure sign-on** window. Copy the **SAML Single Sign-On Service URL** from the **Quick Reference section.**
127
128
128
129

129
130
130
-
1. To configure single sign-on on **Dropbox for Business** side, Go on your Dropbox for Business tenant.
131
+
7. To configure single sign-on on **Dropbox for Business** side, Go on your Dropbox for Business tenant and sign on to your Dropbox for business tenant.
131
132
132
-
a. Sign on to your Dropbox for business tenant.
133
-
134
133

135
-
136
-
b. In the navigation pane on the left side, click **Admin Console**.
137
-
138
-

139
-
140
-
c. On the **Admin Console**, click **Authentication** in the left navigation pane.
141
-
142
-

143
-
144
-
d. In the **Single sign-on** section, select **Enable single sign-on**, and then click **More** to expand this section.
145
-
146
-

147
-
148
-
e. Copy the URL next to **Users can sign in by entering their email address or they can go directly to** and paste it into the **Sign-on URL** textbox of **Dropbox for Business Domain and URLs** section on Azure portal.
149
-
150
-

151
-
152
-
1. In the **Single sign-on** section of the **Authentication** page, perform the following steps:
153
-
154
-

155
-
156
-
a. Click **Required**.
157
-
158
-
b. In the **Sign-in URL** textbox, paste the value of **SAML Single Sign-On Service URL** which you have copied from the Azure portal.
159
134
160
-
c. Click **Choose certificate**, and then browse to your **Base64 encoded certificate file**.
135
+
8. Click on the **User Icon** and select **Settings** tab.
136
+
137
+

138
+
139
+
9. In the navigation pane on the left side, click **Admin console**.
140
+
141
+

142
+
143
+
10. On the **Admin console**, click **Settings** in the left navigation pane.
144
+
145
+

146
+
147
+
11. Select **Single sign-on** option under the **Authentication** section.
148
+
149
+

150
+
151
+
12. In the **Single sign-on** section, perform the following steps:
152
+
153
+

154
+
155
+
a. Select **Required** as a option from the dropdown for the **Single sign-on**.
156
+
157
+
b. Click on **Add sign-in URL** and in the **Identity provider sign-in URL** textbox, paste the **SAML Single Sign-On Service URL** value which you have copied from the Azure portal and then select **Done**.
158
+
159
+

160
+
161
+
c. Click **Upload certificate**, and then browse to your **Base64 encoded certificate file** which you have downloaded from the Azure portal.
161
162
162
-
d. Click **Save changes**to complete the configuration on your DropBox for Business tenant.
163
+
d. Click on **Copy link**and paste the copied value into the **Sign-on URL** textbox of **Dropbox for Business Domain and URLs** section on Azure portal.
163
164
164
-
> [!TIP]
165
-
> You can now read a concise version of these instructions inside the [Azure portal](https://portal.azure.com), while you are setting up the app! After adding this app from the **Active Directory > Enterprise Applications** section, simply click the **Single Sign-On** tab and access the embedded documentation through the **Configuration** section at the bottom. You can read more about the embedded documentation feature here: [Azure AD embedded documentation](https://go.microsoft.com/fwlink/?linkid=845985)
0 commit comments