Skip to content

Commit 95e401d

Browse files
authored
Merge pull request #104357 from davidmu1/reportsmonitoring1
Graph scrub on reports monitoring
2 parents 26e0308 + fb1f89b commit 95e401d

File tree

4 files changed

+8
-26
lines changed

4 files changed

+8
-26
lines changed

articles/active-directory/reports-monitoring/concept-reporting-api.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -47,13 +47,10 @@ For detailed instructions, see the [prerequisites to access the Azure Active Dir
4747
The Microsoft Graph API endpoint for audit logs is `https://graph.microsoft.com/beta/auditLogs/directoryAudits` and the Microsoft Graph API endpoint for sign-ins is `https://graph.microsoft.com/beta/auditLogs/signIns`. For more information, see the [audit API reference](https://developer.microsoft.com/graph/docs/api-reference/beta/resources/directoryaudit) and [sign-in API reference](https://developer.microsoft.com/graph/docs/api-reference/beta/resources/signIn).
4848

4949
In addition, you can use the [Identity Protection risk detections API](https://developer.microsoft.com/graph/docs/api-reference/beta/resources/identityriskevent) to gain programmatic access to security detections using Microsoft Graph. For more information, see [Get started with Azure Active Directory Identity Protection and Microsoft Graph](../identity-protection/graph-get-started.md).
50-
51-
> [!NOTE]
52-
> The **https:\/\/graph.windows.net\/\<tenant-name\>\/reports\/** endpoint is deprecated. Use the new API endpoints described above to programmatically access the activity and security reports.
5350

54-
## APIs with Graph Explorer
51+
## APIs with Microsoft Graph Explorer
5552

56-
You can use the [MSGraph explorer](https://developer.microsoft.com/graph/graph-explorer) to verify your sign-in and audit API data. Make sure to sign in to your account using both of the sign-in buttons in the Graph Explorer UI, and set **AuditLog.Read.All** and **Directory.Read.All** permissions for your tenant as shown.
53+
You can use the [Microsoft Graph explorer](https://developer.microsoft.com/graph/graph-explorer) to verify your sign-in and audit API data. Make sure to sign in to your account using both of the sign-in buttons in the Graph Explorer UI, and set **AuditLog.Read.All** and **Directory.Read.All** permissions for your tenant as shown.
5754

5855
![Graph Explorer](./media/concept-reporting-api/graph-explorer.png)
5956

articles/active-directory/reports-monitoring/howto-configure-prerequisites-for-reporting-api.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ ms.collection: M365-identity-device-management
2222
---
2323
# Prerequisites to access the Azure Active Directory reporting API
2424

25-
The [Azure Active Directory (Azure AD) reporting APIs](https://msdn.microsoft.com/library/azure/ad/graph/howto/azure-ad-reports-and-events-preview) provide you with programmatic access to the data through a set of REST-based APIs. You can call these APIs from of programming languages and tools.
25+
The [Azure Active Directory (Azure AD) reporting APIs](https://docs.microsoft.com/azure/active-directory/reports-monitoring/concept-reporting-api) provide you with programmatic access to the data through a set of REST-based APIs. You can call these APIs from of programming languages and tools.
2626

2727
The reporting API uses [OAuth](https://docs.microsoft.com/azure/api-management/api-management-howto-protect-backend-with-aad) to authorize access to the web APIs.
2828

@@ -187,7 +187,6 @@ You need these values when configuring calls to the reporting API.
187187

188188
This section lists the common error messages you may run into while accessing activity reports using the Microsoft Graph API and steps for their resolution.
189189

190-
191190
### Error: Failed to get user roles from Microsoft Graph
192191

193192
Sign into your account using both sign-in buttons in the Graph Explorer UI to avoid getting an error when trying to sign in using Graph Explorer.
@@ -200,7 +199,6 @@ If you run into this error message while trying to access sign-ins using Graph E
200199

201200
![Modify permissions UI](./media/troubleshoot-graph-api/modify-permissions.png)
202201

203-
204202
### Error: Tenant is not B2C or tenant doesn't have premium license
205203

206204
Accessing sign-in reports requires an Azure Active Directory premium 1 (P1) license. If you see this error message while accessing sign-ins, make sure that your tenant is licensed with an Azure AD P1 license.
@@ -211,7 +209,7 @@ Accessing sign-in reports requires an Azure Active Directory premium 1 (P1) lice
211209

212210
### Error: Application missing AAD 'Read directory data' permission
213211

214-
### Error: Application missing Microsoft API 'Read all audit log data' permission
212+
### Error: Application missing Microsoft Graph API 'Read all audit log data' permission
215213

216214
Follow the steps in the [Prerequisites to access the Azure Active Directory reporting API](howto-configure-prerequisites-for-reporting-api.md) to ensure your application is running with the right set of permissions.
217215

articles/active-directory/reports-monitoring/reports-faq.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Azure Active Directory Reports FAQ | Microsoft Docs
3-
description: Frequently asked quesitons around Azure Active Directory reports.
3+
description: Frequently asked questions around Azure Active Directory reports.
44
services: active-directory
55
documentationcenter: ''
66
author: cawrites
@@ -34,7 +34,7 @@ This article includes answers to frequently asked questions about Azure Active D
3434

3535
**Q: I currently use the `https://graph.windows.net/<tenant-name>/reports/` endpoint APIs to pull Azure AD security reports (specific types of detections, such as leaked credentials or sign-ins from anonymous IP addresses) into our reporting systems programmatically. What should I switch to?**
3636

37-
**A:** You can use the [Identity Protection risk detections API](../identity-protection/graph-get-started.md) to access security detections through Microsoft Graph. This new format gives greater flexibility in how you can query data, with advanced filtering, field selection, and more, and standardizes risk detections into one type for easier integration into SIEMs and other data collection tools. Because the data is in a different format, you can't substitute a new query for your old queries. However, [the new API uses Microsoft Graph](https://developer.microsoft.com/graph/docs/api-reference/beta/resources/identityriskevent), which is the Microsoft standard for such APIs as O365 or Azure AD. So the work required can either extend your current MS Graph investments or help you begin your transition to this new standard platform.
37+
**A:** You can use the [Identity Protection risk detections API](../identity-protection/graph-get-started.md) to access security detections through Microsoft Graph. This new format gives greater flexibility in how you can query data, with advanced filtering, field selection, and more, and standardizes risk detections into one type for easier integration into SIEMs and other data collection tools. Because the data is in a different format, you can't substitute a new query for your old queries. However, [the new API uses Microsoft Graph](https://developer.microsoft.com/graph/docs/api-reference/beta/resources/identityriskevent), which is the Microsoft standard for such APIs as O365 or Azure AD. So the work required can either extend your current Microsoft Graph investments or help you begin your transition to this new standard platform.
3838

3939
---
4040

articles/active-directory/reports-monitoring/troubleshoot-graph-api.md

Lines changed: 2 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -24,25 +24,12 @@ ms.collection: M365-identity-device-management
2424

2525
# Troubleshoot errors in Azure Active Directory reporting API
2626

27-
This article lists the common error messages you may run into while accessing activity reports using the MS Graph API and steps for their resolution.
27+
This article lists the common error messages you may run into while accessing activity reports using the Microsoft Graph API and steps for their resolution.
2828

2929
### 500 HTTP internal server error while accessing Microsoft Graph V2 endpoint
3030

3131
We do not currently support the Microsoft Graph v2 endpoint - make sure to access the activity logs using the Microsoft Graph v1 endpoint.
3232

33-
### Error: Failed to get user roles from AD Graph
34-
35-
You may get this error message when trying to access sign-ins using Graph Explorer. Make sure you are signed in to your account using both of the sign-in buttons in the Graph Explorer UI, as shown in the following image.
36-
37-
![Graph Explorer](./media/troubleshoot-graph-api/graph-explorer.png)
38-
39-
### Error: Failed to do premium license check from AD Graph
40-
41-
If you run into this error message while trying to access sign-ins using Graph Explorer, choose **Modify Permissions** underneath your account on the left nav, and select **Tasks.ReadWrite** and **Directory.Read.All**.
42-
43-
![Modify permissions UI](./media/troubleshoot-graph-api/modify-permissions.png)
44-
45-
4633
### Error: Neither tenant is B2C or tenant doesn't have premium license
4734

4835
Accessing sign-in reports requires an Azure Active Directory premium 1 (P1) license. If you see this error message while accessing sign-ins, make sure that your tenant is licensed with an Azure AD P1 license.
@@ -55,7 +42,7 @@ If you see this error message while trying to access audit logs or sign-ins usin
5542

5643
Please follow the steps in the [Prerequisites to access the Azure Active Directory reporting API](howto-configure-prerequisites-for-reporting-api.md) to ensure your application is running with the right set of permissions.
5744

58-
### Error: Application missing MSGraph API 'Read all audit log data' permission
45+
### Error: Application missing Microsoft Graph API 'Read all audit log data' permission
5946

6047
Please follow the steps in the [Prerequisites to access the Azure Active Directory reporting API](howto-configure-prerequisites-for-reporting-api.md) to ensure your application is running with the right set of permissions.
6148

0 commit comments

Comments
 (0)