Skip to content

Commit 9570566

Browse files
authored
Merge pull request #235652 from shlipsey3/reports-usage-insights-042423
reports-usage-insights-042423
2 parents 8dbf31b + 29e66d6 commit 9570566

File tree

7 files changed

+159
-20
lines changed

7 files changed

+159
-20
lines changed

articles/active-directory/reports-monitoring/concept-usage-insights-report.md

Lines changed: 159 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -8,59 +8,96 @@ ms.service: active-directory
88
ms.topic: conceptual
99
ms.workload: identity
1010
ms.subservice: report-monitor
11-
ms.date: 01/10/2023
11+
ms.date: 05/30/2023
1212
ms.author: sarahlipsey
13-
ms.reviewer: besiler
13+
ms.reviewer: madansr7
1414
---
1515

1616
# Usage and insights in Azure Active Directory
1717

18-
With the Azure Active Directory (Azure AD) **Usage and insights** reports, you can get an application-centric view of your sign-in data. Usage & insights also includes a report on authentication methods activity. You can find answers to the following questions:
18+
With the Azure Active Directory (Azure AD) **Usage and insights** reports, you can get an application-centric view of your sign-in data. Usage & insights includes a report on authentication methods, service principal sign-ins, and application credential activity. You can find answers to the following questions:
1919

20-
* What are the top used applications in my organization?
21-
* What applications have the most failed sign-ins?
22-
* What are the top sign-in errors for each application?
20+
* What are the top used applications in my organization?
21+
* What applications have the most failed sign-ins?
22+
* What are the top sign-in errors for each application?
23+
* What was the date of the last sign-in for an application?
2324

24-
This article provides an overview of three reports that look sign-in data.
25+
## Prerequisites
2526

26-
## Access Usage & insights
27-
28-
Accessing the data from Usage and insights requires:
27+
To access the data from Usage and insights you must have:
2928

3029
* An Azure AD tenant
3130
* An Azure AD premium (P1/P2) license to view the sign-in data
32-
* A user in the Global Administrator, Security Administrator, Security Reader, or Reports Reader roles.
31+
* A user in the Reports Reader, Security Reader, Security Administrator, or Global Administrator role.
32+
33+
## Access Usage and insights
34+
35+
You can access the Usage and insights reports from the Azure portal and using Microsoft Graph.
3336

34-
To access Usage & insights:
37+
### To access Usage & insights in the portal:
3538

3639
1. Sign in to the [Azure portal](https://portal.azure.com) using the appropriate least privileged role.
3740
1. Go to **Azure Active Directory** > **Usage & insights**.
3841

39-
The **Usage & insights** report is also available from the **Enterprise applications** area of Azure AD. All users can access their own sign-ins at the [My Sign-Ins portal](https://mysignins.microsoft.com/security-info).
42+
The **Usage & insights** reports are also available from the **Enterprise applications** area of Azure AD. All users can access their own sign-ins at the [My Sign-Ins portal](https://mysignins.microsoft.com/security-info).
4043

41-
## View the Usage & insights reports
44+
### To access Usage & insights using Microsoft Graph:
4245

43-
There are currently three reports available in Azure AD Usage & insights. All three reports use sign-in data to provide helpful information an application usage and authentication methods.
46+
The reports can be viewed and managed using Microsoft Graph on the `/beta` endpoint in Graph Explorer.
4447

45-
### Azure AD application activity (preview)
48+
1. Sign in to [Graph Explorer](https://aka.ms/ge).
49+
1. Select **GET** as the HTTP method from the dropdown.
50+
1. Set the API version to **beta**.
51+
52+
Refer to the section on each report in this article for the specific objects and parameters to include. For more information, see the [Microsoft Graph documentation for Identity and access reports](/graph/api/resources/report-identity-access).
53+
54+
## Azure AD application activity (preview)
4655

4756
The **Azure AD application activity (preview)** report shows the list of applications with one or more sign-in attempts. Any application activity during the selected date range appears in the report. The report allows you to sort by the number of successful sign-ins, failed sign-ins, and the success rate.
4857

4958
It's possible that activity for a deleted application may appear in the report if the activity took place during the selected date range and before the application was deleted. Other scenarios could include a user attempting to sign in to an application that doesn't have a service principal associated with the app. For these types of scenarios, you may need to review the audit logs or sign-in logs to investigate further.
5059

51-
Select the **View sign in activity** link for an application to view more details. The sign-in graph per application counts interactive user sign-ins. The details of any sign-in failures appears below the table.
60+
To view the details of the sign-in activity for an application, select the **View sign-in activity** link for the application.
5261

5362
![Screenshot shows Usage and insights for Application activity where you can select a range and view sign-in activity for different apps.](./media/concept-usage-insights-report/usage-insights-overview.png)
5463

55-
Select a day in the application usage graph to see a detailed list of the sign-in activities for the application. This detailed list is actually the sign-in log with the filter set to the selected application and date.
64+
The sign-in activity graph uses interactive user sign-ins. Select a day in the application usage graph to see a detailed list of the sign-in activities for the application. This detailed list is actually the sign-in log with the filter set to the selected application and date. The details of any sign-in failures appear below the table.
5665

5766
![Screenshot of the sign-in activity details for a selected application.](./media/concept-usage-insights-report/application-activity-sign-in-detail.png)
5867

59-
### AD FS application activity
68+
### Application activity using Microsoft Graph
69+
70+
You can view the `applicationSignInSummary` or `applicationSignInDetailedSummary` of Azure AD application activity with Microsoft Graph.
71+
72+
Add the following query to view the **sign-in summary**, then select the **Run query** button.
73+
74+
```http
75+
GET https://graph.microsoft.com/beta/reports/getAzureADApplicationSignInSummary(period='{period}')
76+
```
77+
78+
Add the following query to view the **sign-in details**, then select the **Run query** button.
79+
80+
```http
81+
GET https://graph.microsoft.com/beta/reports/applicationSignInDetailedSummary/{id}
82+
```
83+
84+
For more information, see [Application sign-in in Microsoft Graph](/graph/api/resources/applicationsigninsummary?view=graph-rest-beta&preserve-view=true).
85+
86+
## AD FS application activity
6087

6188
The **AD FS application activity** report in Usage & insights lists all Active Directory Federated Services (AD FS) applications in your organization that have had an active user login to authenticate in the last 30 days. These applications have not been migrated to Azure AD for authentication.
6289

63-
### Authentication methods activity
90+
Viewing the AD FS application activity using Microsoft Graph retrieves a list of the `relyingPartyDetailedSummary` objects, which identifies the relying party to a particular Federation Service.
91+
92+
Add the following query, then select the **Run query** button.
93+
94+
```http
95+
GET https://graph.microsoft.com/beta/reports/getRelyingPartyDetailedSummary
96+
```
97+
98+
For more information, see [AD FS application activity in Microsoft Graph](/graph/api/resources/relyingpartydetailedsummary?view=graph-rest-beta&preserve-view=true).
99+
100+
## Authentication methods activity
64101

65102
The **Authentication methods activity** in Usage & insights displays visualizations of the different authentication methods used by your organization. The **Registration tab** displays statistics of users registered for each of your available authentication methods. Select the **Usage** tab at the top of the page to see actual usage for each authentication method.
66103

@@ -72,6 +109,108 @@ Looking for the details of a user and their authentication methods? Look at the
72109

73110
Looking for the status of an authentication registration or reset event of a user? Look at the **Registration and reset events** report from the side menu and then search for a name or UPN. You'll be able to see the method used to attempt to register or reset an authentication method.
74111

112+
## Service principal sign-in activity (preview)
113+
114+
The Service principal sign-in activity (preview) report provides the last activity date for every service principal. The report provides you information on the usage of the service principal - whether it was used as a client or resource app and whether it was used in an app-only or delegated context. The report shows the last time the service principal was used.
115+
116+
[ ![Screenshot of the service principal sign-in activity report.](./media/concept-usage-insights-report/service-principal-sign-ins.png) ](./media/concept-usage-insights-report/service-principal-sign-ins.png#lightbox)
117+
118+
Select the **View more details** link to locate the client and object IDs for the application as well as specific service principal sign-in activity.
119+
120+
[ ![Screenshot of the service principal sign-in activity details.](./media/concept-usage-insights-report/service-principal-sign-in-activity-details.png) ](./media/concept-usage-insights-report/service-principal-sign-in-activity-details.png#lightbox)
121+
122+
### Service principal sign-in activity using Microsoft Graph
123+
124+
The `servicePrincipalSignInActivity` reports can be viewed using Microsoft Graph in Graph Explorer.
125+
126+
Add the following query to retrieve the service principal sign-in activity, then select the **Run query** button.
127+
128+
```http
129+
GET https://graph.microsoft.com/beta/reports/servicePrincipalSignInActivities/{id}
130+
```
131+
132+
The following is an example of the response:
133+
134+
```json
135+
{
136+
"@odata.context": "https://graph.microsoft.com/beta/$metadata#reports/servicePrincipalSignInActivities",
137+
"id": "ODNmNDUyOTYtZmI4Zi00YWFhLWEzOTktYWM1MTA4NGUwMmI3",
138+
"appId": "83f45296-fb8f-4aaa-a399-ac51084e02b7",
139+
"delegatedClientSignInActivity": {
140+
"lastSignInDateTime": "2021-01-01T00:00:00Z",
141+
"lastSignInRequestId": "2d245633-0f48-4b0e-8c04-546c2bcd61f5"
142+
},
143+
"delegatedResourceSignInActivity": {
144+
"lastSignInDateTime": "2021-02-01T00:00:00Z",
145+
"lastSignInRequestId": "d2b4c623-f930-42b5-9519-7851ca604b16"
146+
},
147+
"applicationAuthenticationClientSignInActivity": {
148+
"lastSignInDateTime": "2021-03-01T00:00:00Z",
149+
"lastSignInRequestId": "b71f24ec-f212-4306-b2ae-c229e15805ea"
150+
},
151+
"applicationAuthenticationResourceSignInActivity": {
152+
"lastSignInDateTime": "2021-04-01T00:00:00Z",
153+
"lastSignInRequestId": "53e6981f-2272-4deb-972c-c8272aca986d"
154+
},
155+
"lastSignInActivity": {
156+
"lastSignInDateTime": "2021-04-01T00:00:00Z",
157+
"lastSignInRequestId": "cd9733e8-d75a-468f-a63d-6e82bd48c05e"
158+
}
159+
}
160+
```
161+
162+
For more information, see [List service principal activity in Microsoft Graph](/graph/api/reportroot-list-serviceprincipalsigninactivities?view=graph-rest-beta&preserve-view=true).
163+
164+
## Application credential activity (preview)
165+
166+
The Application credential activity (preview) report provides the last credential activity date for every application credential. The report provides the credential type (certificate or client secret), the last used date, and the expiration date. With this report you can view the expiration dates of all your applications in one place.
167+
168+
To view the details of the application credential activity, select the **View more details** link. These details include the application object, service principal, and resource IDs. You can also see if the credential origin is the application or the service principal.
169+
170+
[ ![Screenshot of the app credential activity report.](media/concept-usage-insights-report/app-credential-activity.png) ](media/concept-usage-insights-report/app-credential-activity.png#lightbox)
171+
172+
When you select the **View more details** link, you can see the application object ID and resource ID, in addition to the details visible in the report.
173+
174+
[ ![Screenshot of the app credential activity details.](media/concept-usage-insights-report/app-credential-activity-details.png) ](media/concept-usage-insights-report/app-credential-activity-details.png#lightbox)
175+
176+
### Application credential activity using Microsoft Graph
177+
178+
Application credential activity can be viewed and managed using Microsoft Graph on the `/beta` endpoint. You can get the application credential sign-in activity by entity `id`, `keyId`, and `appId` .
179+
180+
To get started, follow these instructions to work with `appCredentialSignInActivity` using Microsoft Graph in Graph Explorer.
181+
182+
1. Sign in to [Graph Explorer](https://aka.ms/ge).
183+
1. Select **GET** as the HTTP method from the dropdown.
184+
1. Set the API version to **beta**.
185+
1. Add the following query to retrieve recommendations, then select the **Run query** button.
186+
187+
```http
188+
GET https://graph.microsoft.com/beta/reports/appCredentialSignInActivities/{id}
189+
```
190+
The following is an example of the response:
191+
192+
```json
193+
{
194+
"@odata.type": "#microsoft.graph.appCredentialSignInActivity",
195+
"id": "ODNmNDUyOTYtZmI4Zi00YWFhLWEzOTktYWM1MTA4NGUwMmI3fGFwcGxpY2F0aW9u",
196+
"keyId": "83f45296-fb8f-4aaa-a399-ac51084e02b7",
197+
"keyType": "certificate",
198+
"keyUsage": "sign",
199+
"appId": "f4d9654f-0305-4072-878c-8bf266dfe146",
200+
"appObjectId": "6920caa5-1cae-4bc8-bf59-9c0b8495d240",
201+
"servicePrincipalObjectId": "cf533854-9fb7-4c01-9c0e-f68922ada8b6",
202+
"resourceId": "a89dc091-a671-4da4-9fcf-3ef06bdf3ac3",
203+
"credentialOrigin": "application",
204+
"expirationDate": "2021-04-01T21:36:48-8:00",
205+
"signInActivity": {
206+
"lastSignInDateTime": "2021-04-01T00:00:00-8:00",
207+
"lastSignInRequestId": "b0a282a3-68ec-4ec8-aef0-290ed4350271"
208+
}
209+
}
210+
```
211+
212+
For more information, see [Application credential activity in Microsoft Graph](/graph/api/resources/appcredentialsigninactivity?view=graph-rest-beta&preserve-view=true).
213+
75214
## Next steps
76215

77216
- [Learn about the sign-ins report](concept-sign-ins.md)
Loading
68.6 KB
Loading
Loading
90.9 KB
Loading

0 commit comments

Comments
 (0)