Skip to content

Commit a818ede

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into rolyon-rbac-role-assignments-count
2 parents e3ed0cd + 0af2d0d commit a818ede

27 files changed

+315
-158
lines changed

articles/active-directory-domain-services/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -91,6 +91,8 @@
9191
href: password-policy.md
9292
- name: Enable security audit events
9393
href: security-audit-events.md
94+
- name: Analyze audit events with Azure Monitor Workbooks
95+
href: use-azure-monitor-workbooks.md
9496
- name: Domain-join VMs
9597
items:
9698
- name: Windows Server VM from template
67.9 KB
Loading
123 KB
Loading
36.4 KB
Loading
127 KB
Loading
77.7 KB
Loading
46.4 KB
Loading
80.3 KB
Loading
Lines changed: 116 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,116 @@
1+
---
2+
title: Use Azure Monitor Workbooks with Azure AD Domain Services | Microsoft Docs
3+
description: Learn how to use Azure Monitor Workbooks to review security audits and understand issues in an Azure Active Directory Domain Services managed domain.
4+
author: iainfoulds
5+
manager: daveba
6+
7+
ms.service: active-directory
8+
ms.subservice: domain-services
9+
ms.workload: identity
10+
ms.topic: conceptual
11+
ms.date: 03/18/2020
12+
ms.author: iainfou
13+
14+
---
15+
# Review security audit events in Azure AD Domain Services using Azure Monitor Workbooks
16+
17+
To help you understand the state of your Azure Active Directory Domain Services (Azure AD DS) managed domain, you can enable security audit events. These security audit events can then be reviewed using Azure Monitor Workbooks that combine text, analytics queries, and parameters into rich interactive reports. Azure AD DS includes workbook templates for security overview and account activity that let you dig into audit events and manage your environment.
18+
19+
This article shows you how to use Azure Monitor Workbooks to review security audit events in Azure AD DS.
20+
21+
## Before you begin
22+
23+
To complete this article, you need the following resources and privileges:
24+
25+
* An active Azure subscription.
26+
* If you don't have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
27+
* An Azure Active Directory tenant associated with your subscription, either synchronized with an on-premises directory or a cloud-only directory.
28+
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
29+
* An Azure Active Directory Domain Services managed domain enabled and configured in your Azure AD tenant.
30+
* If needed, complete the tutorial to [create and configure an Azure Active Directory Domain Services instance][create-azure-ad-ds-instance].
31+
* Security audit events enabled for your Azure Active Directory Domain Services managed domain that stream data to a Log Analytics workspace.
32+
* If needed, [enable security audits for Azure Active Directory Domain Services][enable-security-audits].
33+
34+
## Azure Monitor Workbooks overview
35+
36+
When security audit events are turned on in Azure AD DS, it can be hard to analyze and identify issues in the managed domain. Azure Monitor lets you aggregate these security audit events and query the data. With Azure Monitor Workbooks, you can visualize this data to make it quicker and easier to identify issues.
37+
38+
Workbook templates are curated reports that are designed for flexible reuse by multiple users and teams. When you open a workbook template, the data from your Azure Monitor environment is loaded. You can use templates without an impact on other users in your organization, and can save your own workbooks based on the template.
39+
40+
Azure AD DS includes the following two workbook templates:
41+
42+
* Security overview report
43+
* Account activity report
44+
45+
For more information about how to edit and manage workbooks, see [Azure Monitor Workbooks overview](../azure-monitor/platform/workbooks-overview.md).
46+
47+
## Use the security overview report workbook
48+
49+
To help you better understand usage and identify potential security threats, the security overview report summarizes sign-in data and identifies accounts you might want to check on. You can view events in a particular date range, and drill down into specific sign-in events, such as bad password attempts or where the account was disabled.
50+
51+
To access the workbook template for the security overview report, complete the following steps:
52+
53+
1. Search for and select **Azure Active Directory Domain Services** in the Azure portal.
54+
1. Select your managed domain, such as *aaddscontoso.com*
55+
1. From the menu on the left-hand side, choose **Monitoring > Workbooks**
56+
57+
![Select the Workbooks menu option in the Azure portal](./media/use-azure-monitor-workbooks/select-workbooks-in-azure-portal.png)
58+
59+
1. Choose the **Security Overview Report**.
60+
1. From the drop-down menus at the top of the workbook, select your Azure subscription and then Azure Monitor workspace. Choose a **Time range**, such as *Last 7 days*.
61+
62+
![Select the Workbooks menu option in the Azure portal](./media/use-azure-monitor-workbooks/select-query-filters.png)
63+
64+
The **Tile view** and **Chart view** options can also be changed to analyze and visualize the data as desired
65+
66+
1. To drill down into a specific event type, select the one of the **Sign-in result** cards such as *Account Locked Out*, as shown in the following example:
67+
68+
![Example Security Overview Report data visualized in Azure Monitor Workbooks](./media/use-azure-monitor-workbooks/example-security-overview-report.png)
69+
70+
1. The lower part of the security overview report below the chart then breaks down the activity type selected. You can filter by usernames involved on the right-hand side, as shown in the following example report:
71+
72+
[![](./media/use-azure-monitor-workbooks/account-lockout-details-cropped.png "Details of account lockouts in Azure Monitor Workbooks")](./media/use-azure-monitor-workbooks/account-lockout-details.png#lightbox)
73+
74+
## Use the account activity report workbook
75+
76+
To help you troubleshoot issues for a specific user account, the account activity report breaks down detailed audit event log information. You can review when a bad username or password was provided during sign-in, and the source of the sign-in attempt.
77+
78+
To access the workbook template for the account activity report, complete the following steps:
79+
80+
1. Search for and select **Azure Active Directory Domain Services** in the Azure portal.
81+
1. Select your managed domain, such as *aaddscontoso.com*
82+
1. From the menu on the left-hand side, choose **Monitoring > Workbooks**
83+
1. Choose the **Account Activity Report**.
84+
1. From the drop-down menus at the top of the workbook, select your Azure subscription and then Azure Monitor workspace. Choose a **Time range**, such as *Last 30 days*, then how you want the **Tile view** to represent the data. You can filter by **Account username**, such as *felix*, as shown in the following example report:
85+
86+
[![](./media/use-azure-monitor-workbooks/account-activity-report-cropped.png "Account activity report in Azure Monitor Workbooks")](./media/use-azure-monitor-workbooks/account-activity-report.png#lightbox)
87+
88+
The area below the chart shows individual sign-in events along with information such as the activity result and source workstation. This information can help determine repeated sources of sign-in events that may cause account lockouts or indicate a potential attack.
89+
90+
As with the security overview report, you can drill down into the different tiles at the top of the report to visualize and analyze the data as needed.
91+
92+
## Save and edit workbooks
93+
94+
The two template workbooks provided by Azure AD DS are a good place to start with your own data analysis. If you need to get more granular in the data queries and investigations, you can save your own workbooks and edit the queries.
95+
96+
1. To save a copy of one of the workbook templates, select **Edit > Save as > Shared reports**, then provide a name and save it.
97+
1. From your own copy of the template, select **Edit** to enter the edit mode. You can choose the blue **Edit** button next to any part of the report and change it.
98+
99+
All of the charts and tables in Azure Monitor Workbooks are generated using Kusto queries. For more information on creating your own queries, see [Azure Monitor log queries][azure-monitor-queries] and [Kusto queries tutorial][kusto-queries].
100+
101+
## Next steps
102+
103+
If you need to adjust password and lockout policies, see [Password and account lockout policies on managed domains][password-policy].
104+
105+
For problems with users, learn how to troubleshoot [account sign-in problems][troubleshoot-sign-in] or [account lockout problems][troubleshoot-account-lockout].
106+
107+
<!-- INTERNAL LINKS -->
108+
[create-azure-ad-tenant]: ../active-directory/fundamentals/sign-up-organization.md
109+
[associate-azure-ad-tenant]: ../active-directory/fundamentals/active-directory-how-subscriptions-associated-directory.md
110+
[create-azure-ad-ds-instance]: tutorial-create-instance.md
111+
[enable-security-audits]: security-audit-events.md
112+
[password-policy]: password-policy.md
113+
[troubleshoot-sign-in]: troubleshoot-sign-in.md
114+
[troubleshoot-account-lockout]: troubleshoot-account-lockout.md
115+
[azure-monitor-queries]: ../azure-monitor/log-query/query-language.md
116+
[kusto-queries]: https://docs.microsoft.com/azure/kusto/query/tutorial?pivots=azuredataexplorer

articles/virtual-machines/troubleshooting/serial-console-errors.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ Unable to determine the resource group for the boot diagnostics storage account
3636
Provisioning for this VM has not yet succeeded. Please ensure the VM is fully deployed and retry the serial console connection. | Your VM or virtual machine scale set may still be provisioning. Wait some time and try again.
3737
Web socket is closed or could not be opened. | You may need to add firewall access to `*.console.azure.com`. A more detailed but longer approach is to allow firewall access to the [Microsoft Azure Datacenter IP ranges](https://www.microsoft.com/download/details.aspx?id=41653), which change fairly regularly.
3838
Serial console does not work with a storage account using Azure Data Lake Storage Gen2 with hierarchical namespaces. | This is a known issue with hierarchical namespaces. To mitigate, ensure that your VM's boot diagnostics storage account is not created using Azure Data Lake Storage Gen2. This option can only be set upon storage account creation. You may have to create a separate boot diagnostics storage account without Azure Data Lake Storage Gen2 enabled to mitigate this issue.
39-
39+
The serial console connection to the VM encountered an error: 'Forbidden'(SubscriptionNotEnabled) - Subscription name undefined, id \<subscription id> is in non-Enabled state undefined | This issue may occur if the subscription that a user has created their Cloud Shell storage account in has been disabled. To mitigate, launch Cloud Shell and [perform the steps necessary](https://docs.microsoft.com/azure/cloud-shell/persisting-shell-storage#unmount-clouddrive-1) to reprovision a backing storage account for Cloud Shell in the current subscription.
4040

4141
## Next steps
4242
* Learn more about the [Azure Serial Console for Linux VMs](./serial-console-linux.md)

0 commit comments

Comments
 (0)