Skip to content

Commit c0d325a

Browse files
Court72normesta
andauthored
Apply suggestions from PR review
Co-authored-by: Norm Estabrook <[email protected]>
1 parent 6dd7d55 commit c0d325a

File tree

1 file changed

+3
-2
lines changed

1 file changed

+3
-2
lines changed

articles/storage/blobs/blob-storage-monitoring-scenarios.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -124,10 +124,11 @@ For the "when" portion of your audit, the `TimeGenerated` field shows when the l
124124
For the "what" portion of your audit, the `Uri` field shows the item was modified or read.
125125

126126
For the "how" portion of your audit, the `OperationName` field shows which operation was executed.
127-
127+
> [!TIP]
128+
> For example, if you suspect that a blob or container has been deleted by mistake, then add a `where` clause that returns only log entries where the `OperationName` is set to either [Delete blob](/rest/api/storageservices/delete-blob) or [Delete Container](/rest/api/storageservices/delete-container).
128129
For the "who" portion of your audit, `AuthenticationType` shows which type of authentication was used to make a request. This field can show any of the types of authentication that Azure Storage supports including the use of an account key, a SAS token, or Azure Active Directory (Azure AD) authentication.
129130

130-
A very common scenario is identifying any un-intentional deletes happening on the account. From the above section of splitting the API by name, it shall help identify the "when" as to when the API’s such as Delete Blob, Delete Container etc were called. For the “who” part, if the authentication type is Azure AD, you can check via field `RequesterObjectId` however if the authentication type is account key or SAS, you can then check based on fields such as `callerIpAddress` and `userAgentHeader`.
131+
If the request is authorized by using Azure AD, you can use the `RequestObjectId` field to identify the "who". Shared Key and SAS authentication provide no means of auditing individual identities. In those cases, the `callerIPAddress` and `userAgentHeader` fields might help you to identify the source of the operation. If a SAS token was used to authorize an operation, you can identify that token, and if you've mapped tokens to token recipients at your end, you can identify which user, organization, or application has performed the operation. See [Identifying the SAS token used to authorize a request](#identifying-the-sas-token-used-to-authorize-a-request).
131132

132133
#### Identifying the security principal used to authorize a request
133134

0 commit comments

Comments
 (0)