You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/governance/entitlement-management-logs-and-reporting.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,7 +40,7 @@ Archiving Azure AD audit logs requires you to have Azure Monitor in an Azure sub
40
40
41
41
1. Select **Azure Active Directory** then select **Diagnostic settings** under Monitoring in the left navigation menu. Check if there's already a setting to send the audit logs to that workspace.
42
42
43
-
1. If there isn't already a setting, select **Add diagnostic setting**. Use the instructions in [Integrate Azure AD logs with Azure Monitor logs](../reports-monitoring/howto-integrate-activity-logs-with-log-analytics.md#send-logs-to-azure-monitor) to send the Azure AD audit log to the Azure Monitor workspace.
43
+
1. If there isn't already a setting, select **Add diagnostic setting**. Use the instructions in [Integrate Azure AD logs with Azure Monitor logs](../reports-monitoring/howto-integrate-activity-logs-with-log-analytics.md) to send the Azure AD audit log to the Azure Monitor workspace.
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/howto-analyze-activity-logs-log-analytics.md
+49-42Lines changed: 49 additions & 42 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,63 +1,69 @@
1
1
---
2
-
title: Analyze activity logs using Azure Monitor logs
3
-
description: Learn how to analyze Azure Active Directory activity logs using Azure Monitor logs
2
+
title: Analyze activity logs using Log Analytics
3
+
description: Learn how to analyze Azure Active Directory activity logs using Log Analytics
4
4
services: active-directory
5
5
author: shlipsey3
6
6
manager: amycolannino
7
7
ms.service: active-directory
8
8
ms.topic: how-to
9
9
ms.workload: identity
10
10
ms.subservice: report-monitor
11
-
ms.date: 10/31/2022
11
+
ms.date: 06/26/2023
12
12
ms.author: sarahlipsey
13
13
ms.reviewer: besiler
14
14
15
15
ms.collection: M365-identity-device-management
16
16
---
17
17
18
-
# Analyze Azure AD activity logs with Azure Monitor logs
18
+
# Analyze Azure AD activity logs with Log Analytics
19
19
20
-
After you [integrate Azure AD activity logs with Azure Monitor logs](howto-integrate-activity-logs-with-log-analytics.md), you can use the power of Azure Monitor logs to gain insights into your environment. You can also install the [Log analytics views for Azure AD activity logs](howto-install-use-log-analytics-views.md) to get access to pre-built reports around audit and sign-in events in your environment.
20
+
After you [integrate Azure AD activity logs with Azure Monitor logs](howto-integrate-activity-logs-with-log-analytics.md), you can use the power of Log Analytics and Azure Monitor logs to gain insights into your environment.
21
21
22
-
In this article, you learn how to analyze the Azure AD activity logs in your Log Analytics workspace.
22
+
* Compare your Azure AD sign-in logs against security logs published by Microsoft Defender for Cloud.
23
+
24
+
* Troubleshoot performance bottlenecks on your application’s sign-in page by correlating application performance data from Azure Application Insights.
* Analyze the Identity Protection risky users and risk detections logs to detect threats in your environment.
25
27
26
-
## Prerequisites
28
+
This article describes to analyze the Azure AD activity logs in your Log Analytics workspace.
27
29
28
-
To follow along, you need:
30
+
## Roles and licenses
29
31
30
-
* A [Log Analytics workspace](../../azure-monitor/logs/log-analytics-workspace-overview.md) in your Azure subscription. Learn how to [create a Log Analytics workspace](../../azure-monitor/logs/quick-create-workspace.md).
31
-
* First, complete the steps to [route the Azure AD activity logs to your Log Analytics workspace](howto-integrate-activity-logs-with-log-analytics.md).
32
-
*[Access](../../azure-monitor/logs/manage-access.md#azure-rbac) to the log analytics workspace
33
-
* The following roles in Azure Active Directory (if you're accessing Log Analytics through Azure portal)
34
-
- Security Admin
35
-
- Security Reader
36
-
- Reports Reader
37
-
- Global Administrator
38
-
39
-
## Navigate to the Log Analytics workspace
32
+
To analyze Azure AD logs with Azure Monitor, you need the following roles and licenses:
33
+
34
+
***An Azure subscription:** If you don't have an Azure subscription, you can [sign up for a free trial](https://azure.microsoft.com/free/).
35
+
36
+
***An Azure AD Premium P1 or P2 tenant:** You can find the license type of your tenant on the [Overview](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/Overview) page in Azure AD.
37
+
38
+
***Reports Reader**, **Security Reader**, or **Security Administrator** access for the Azure AD tenant: These roles are required to view Log Analytics through the Azure AD portal.
39
+
40
+
***Permission to access data in a Log Analytics workspace:** See [Manage access to log data and workspaces in Azure Monitor](../../azure-monitor/logs/manage-access.md) for information on the different permission options and how to configure permissions.
41
+
42
+
## Access Log Analytics
43
+
44
+
To view the Azure AD Log Analytics, you must already be sending your activity logs from Azure AD to a Log Analytics workspace. This process is covered in the [How to integrate activity logs with Azure Monitor](howto-integrate-activity-logs-with-log-analytics.md) article.
1. Sign in to the [Azure portal](https://portal.azure.com).
44
49
45
-
2. Select **Azure Active Directory**, and then select **Logs** from the **Monitoring** section to open your Log Analytics workspace. The workspace will open with a default query.
50
+
1. Go to **Azure Active Directory** > **Log Analytics**. A default search query runs.
1. Expand the **LogManagement** category to view the list of log related queries.
49
55
50
-
## View the schema for Azure AD activity logs
56
+
1. Select or hover over the name of a query to view a description and other useful details.
51
57
52
-
The logs are pushed to the **AuditLogs** and **SigninLogs** tables in the workspace. To view the schema for these tables:
58
+

53
59
54
-
1.From the default query view in the previous section, select **Schema** and expand the workspace.
60
+
1.Expand a query from the list to view the schema.
55
61
56
-
2. Expand the **Log Management** section and then expand either **AuditLogs** or **SigninLogs** to view the logschema.
62
+

57
63
58
-
## Query the Azure AD activity logs
64
+
## Query activity logs
59
65
60
-
Now that you have the logs in your workspace, you can now run queries against them. For example, to get the top applications used in the last week, replace the default query with the following and select **Run**
66
+
You can run queries against the activity logs being routed to a Log Analytics workspace. For example, to get a list of applications with the most sign-ins from last week, enter the following query and select the **Run** button.
61
67
62
68
```
63
69
SigninLogs
@@ -74,34 +80,35 @@ AuditLogs
74
80
| summarize auditCount = count() by OperationName
75
81
| sort by auditCount desc
76
82
```
77
-
## Alert on Azure AD activity log data
78
-
79
-
You can also set up alerts on your query. For example, to configure an alert when more than 10 applications have been used in the last week:
80
-
81
-
1. From the workspace, select **Set alert** to open the **Create rule** page.
You can also set up alerts on a query. After running a query, the **+ New alert rule** button becomes active.
84
86
85
-
2. Select the default **alert criteria** created in the alert and update the **Threshold** in the default metric to 10.
87
+
1. From Log Analytics, select the **+ New alert rule** button.
88
+
- The **Create a rule** process involves several sections to customize the criteria for the rule.
89
+
- For more information on creating alert rules, see [Create a new alert rule](../../azure-monitor/alerts/alerts-create-new-alert-rule.md) from the Azure Monitor documentation, starting with the **Condition** steps.
90
+
91
+

1. On the **Actions** tab, select the **Action Group** that will receive the alert when the signal occurs.
94
+
- You can choose to notify your team via email or text message, or you could automate the action using webhooks, Azure functions or logic apps.
95
+
- Learn more about [creating and managing alert groups in the Azure portal](../../azure-monitor/alerts/action-groups.md).
88
96
89
-
3. Enter a name and description for the alert, and choose the severity level. For our example, we could set it to **Informational**.
97
+
1. On the **Details** tab, give the alert rule a name and associate it with a subscription and resource group.
90
98
91
-
4. Select the **Action Group** that will be alerted when the signal occurs. You can choose to notify your team via email or text message, or you could automate the action using webhooks, Azure functions or logic apps. Learn more about [creating and managing alert groups in the Azure portal](../../azure-monitor/alerts/action-groups.md).
99
+
1. After configuring all necessary details, select the **Review + Create** button.
92
100
93
-
5. Once you've configured the alert, select **Create alert**to enable it.
101
+
## Use workbooks to analyze logs
94
102
95
-
## Use pre-built workbooks for Azure AD activity logs
103
+
Azure AD workbooks provide several reports related to common scenarios involving audit, sign-in, and provisioning events. *You can also alert on any of the data provided in the reports, using the steps described in the previous section.*
96
104
97
-
The workbooks provide several reports related to common scenarios involving audit, sign-in, and provisioning events. You can also alert on any of the data provided in the reports, using the steps described in the previous section.
105
+
***Provisioning analysis:** This workbook shows reports related to auditing provisioning activity. Activities can include the number of new users provisioned, provisioning failures, number of users updated, update failures, the number of users deprovisioned, and corresponding failures. For more information, see [Understand how provisioning integrates with Azure Monitor logs](../app-provisioning/application-provisioning-log-analytics.md).
98
106
99
-
***Provisioning analysis**: This [workbook](../app-provisioning/application-provisioning-log-analytics.md) shows reports related to auditing provisioning activity. Activities can include the number of new users provisioned, provisioning failures, number of users updated, update failures, the number of users de-provisioned, and corresponding failures.
100
107
***Sign-ins Events**: This workbook shows the most relevant reports related to monitoring sign-in activity, such as sign-ins by application, user, device, and a summary view tracking the number of sign-ins over time.
101
-
***Conditional access insights**: The Conditional Access insights and reporting [workbook](../conditional-access/howto-conditional-access-insights-reporting.md) enables you to understand the effect of Conditional Access policies in your organization over time.
108
+
109
+
***Conditional access insights**: The Conditional Access insights and reporting workbook enables you to understand the effect of Conditional Access policies in your organization over time. For more information, see [Conditional Access insights and reporting](../conditional-access/howto-conditional-access-insights-reporting.md).
102
110
103
111
## Next steps
104
112
105
113
*[Get started with queries in Azure Monitor logs](../../azure-monitor/logs/get-started-queries.md)
106
114
*[Create and manage alert groups in the Azure portal](../../azure-monitor/alerts/action-groups.md)
107
-
*[Install and use the log analytics views for Azure Active Directory](howto-install-use-log-analytics-views.md)
0 commit comments