Skip to content

Commit c705bca

Browse files
Merge pull request #243025 from shlipsey3/reports-062623
reports-062623
2 parents 45b702c + 5b1df95 commit c705bca

18 files changed

+339
-325
lines changed

articles/active-directory/governance/entitlement-management-logs-and-reporting.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ Archiving Azure AD audit logs requires you to have Azure Monitor in an Azure sub
4040

4141
1. Select **Azure Active Directory** then select **Diagnostic settings** under Monitoring in the left navigation menu. Check if there's already a setting to send the audit logs to that workspace.
4242

43-
1. If there isn't already a setting, select **Add diagnostic setting**. Use the instructions in [Integrate Azure AD logs with Azure Monitor logs](../reports-monitoring/howto-integrate-activity-logs-with-log-analytics.md#send-logs-to-azure-monitor) to send the Azure AD audit log to the Azure Monitor workspace.
43+
1. If there isn't already a setting, select **Add diagnostic setting**. Use the instructions in [Integrate Azure AD logs with Azure Monitor logs](../reports-monitoring/howto-integrate-activity-logs-with-log-analytics.md) to send the Azure AD audit log to the Azure Monitor workspace.
4444

4545
![Diagnostics settings pane](./media/entitlement-management-logs-and-reporting/audit-log-diagnostics-settings.png)
4646

articles/active-directory/reports-monitoring/concept-activity-logs-azure-monitor.md

Lines changed: 64 additions & 107 deletions
Large diffs are not rendered by default.

articles/active-directory/reports-monitoring/howto-access-activity-logs.md

Lines changed: 140 additions & 106 deletions
Large diffs are not rendered by default.

articles/active-directory/reports-monitoring/howto-analyze-activity-logs-log-analytics.md

Lines changed: 49 additions & 42 deletions
Original file line numberDiff line numberDiff line change
@@ -1,63 +1,69 @@
11
---
2-
title: Analyze activity logs using Azure Monitor logs
3-
description: Learn how to analyze Azure Active Directory activity logs using Azure Monitor logs
2+
title: Analyze activity logs using Log Analytics
3+
description: Learn how to analyze Azure Active Directory activity logs using Log Analytics
44
services: active-directory
55
author: shlipsey3
66
manager: amycolannino
77
ms.service: active-directory
88
ms.topic: how-to
99
ms.workload: identity
1010
ms.subservice: report-monitor
11-
ms.date: 10/31/2022
11+
ms.date: 06/26/2023
1212
ms.author: sarahlipsey
1313
ms.reviewer: besiler
1414

1515
ms.collection: M365-identity-device-management
1616
---
1717

18-
# Analyze Azure AD activity logs with Azure Monitor logs
18+
# Analyze Azure AD activity logs with Log Analytics
1919

20-
After you [integrate Azure AD activity logs with Azure Monitor logs](howto-integrate-activity-logs-with-log-analytics.md), you can use the power of Azure Monitor logs to gain insights into your environment. You can also install the [Log analytics views for Azure AD activity logs](howto-install-use-log-analytics-views.md) to get access to pre-built reports around audit and sign-in events in your environment.
20+
After you [integrate Azure AD activity logs with Azure Monitor logs](howto-integrate-activity-logs-with-log-analytics.md), you can use the power of Log Analytics and Azure Monitor logs to gain insights into your environment.
2121

22-
In this article, you learn how to analyze the Azure AD activity logs in your Log Analytics workspace.
22+
* Compare your Azure AD sign-in logs against security logs published by Microsoft Defender for Cloud.
23+
24+
* Troubleshoot performance bottlenecks on your application’s sign-in page by correlating application performance data from Azure Application Insights.
2325

24-
[!INCLUDE [azure-monitor-log-analytics-rebrand](../../../includes/azure-monitor-log-analytics-rebrand.md)]
26+
* Analyze the Identity Protection risky users and risk detections logs to detect threats in your environment.
2527

26-
## Prerequisites
28+
This article describes to analyze the Azure AD activity logs in your Log Analytics workspace.
2729

28-
To follow along, you need:
30+
## Roles and licenses
2931

30-
* A [Log Analytics workspace](../../azure-monitor/logs/log-analytics-workspace-overview.md) in your Azure subscription. Learn how to [create a Log Analytics workspace](../../azure-monitor/logs/quick-create-workspace.md).
31-
* First, complete the steps to [route the Azure AD activity logs to your Log Analytics workspace](howto-integrate-activity-logs-with-log-analytics.md).
32-
* [Access](../../azure-monitor/logs/manage-access.md#azure-rbac) to the log analytics workspace
33-
* The following roles in Azure Active Directory (if you're accessing Log Analytics through Azure portal)
34-
- Security Admin
35-
- Security Reader
36-
- Reports Reader
37-
- Global Administrator
38-
39-
## Navigate to the Log Analytics workspace
32+
To analyze Azure AD logs with Azure Monitor, you need the following roles and licenses:
33+
34+
* **An Azure subscription:** If you don't have an Azure subscription, you can [sign up for a free trial](https://azure.microsoft.com/free/).
35+
36+
* **An Azure AD Premium P1 or P2 tenant:** You can find the license type of your tenant on the [Overview](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/Overview) page in Azure AD.
37+
38+
* **Reports Reader**, **Security Reader**, or **Security Administrator** access for the Azure AD tenant: These roles are required to view Log Analytics through the Azure AD portal.
39+
40+
* **Permission to access data in a Log Analytics workspace:** See [Manage access to log data and workspaces in Azure Monitor](../../azure-monitor/logs/manage-access.md) for information on the different permission options and how to configure permissions.
41+
42+
## Access Log Analytics
43+
44+
To view the Azure AD Log Analytics, you must already be sending your activity logs from Azure AD to a Log Analytics workspace. This process is covered in the [How to integrate activity logs with Azure Monitor](howto-integrate-activity-logs-with-log-analytics.md) article.
4045

4146
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
4247

4348
1. Sign in to the [Azure portal](https://portal.azure.com).
4449

45-
2. Select **Azure Active Directory**, and then select **Logs** from the **Monitoring** section to open your Log Analytics workspace. The workspace will open with a default query.
50+
1. Go to **Azure Active Directory** > **Log Analytics**. A default search query runs.
4651

4752
![Default query](./media/howto-analyze-activity-logs-log-analytics/defaultquery.png)
4853

54+
1. Expand the **LogManagement** category to view the list of log related queries.
4955

50-
## View the schema for Azure AD activity logs
56+
1. Select or hover over the name of a query to view a description and other useful details.
5157

52-
The logs are pushed to the **AuditLogs** and **SigninLogs** tables in the workspace. To view the schema for these tables:
58+
![Screenshot of the details of a query.](media/howto-analyze-activity-logs-log-analytics/log-analytics-query-details.png)
5359

54-
1. From the default query view in the previous section, select **Schema** and expand the workspace.
60+
1. Expand a query from the list to view the schema.
5561

56-
2. Expand the **Log Management** section and then expand either **AuditLogs** or **SigninLogs** to view the log schema.
62+
![Screenshot of the schema of a query.](media/howto-analyze-activity-logs-log-analytics/log-analytics-query-schema.png)
5763

58-
## Query the Azure AD activity logs
64+
## Query activity logs
5965

60-
Now that you have the logs in your workspace, you can now run queries against them. For example, to get the top applications used in the last week, replace the default query with the following and select **Run**
66+
You can run queries against the activity logs being routed to a Log Analytics workspace. For example, to get a list of applications with the most sign-ins from last week, enter the following query and select the **Run** button.
6167

6268
```
6369
SigninLogs
@@ -74,34 +80,35 @@ AuditLogs
7480
| summarize auditCount = count() by OperationName
7581
| sort by auditCount desc
7682
```
77-
## Alert on Azure AD activity log data
78-
79-
You can also set up alerts on your query. For example, to configure an alert when more than 10 applications have been used in the last week:
80-
81-
1. From the workspace, select **Set alert** to open the **Create rule** page.
83+
## Set up alerts
8284

83-
![Set alert](./media/howto-analyze-activity-logs-log-analytics/setalert.png)
85+
You can also set up alerts on a query. After running a query, the **+ New alert rule** button becomes active.
8486

85-
2. Select the default **alert criteria** created in the alert and update the **Threshold** in the default metric to 10.
87+
1. From Log Analytics, select the **+ New alert rule** button.
88+
- The **Create a rule** process involves several sections to customize the criteria for the rule.
89+
- For more information on creating alert rules, see [Create a new alert rule](../../azure-monitor/alerts/alerts-create-new-alert-rule.md) from the Azure Monitor documentation, starting with the **Condition** steps.
90+
91+
![Screenshot of the "+ New alert rule" button in Log Analytics.](media/howto-analyze-activity-logs-log-analytics/log-analytics-new-alert.png)
8692

87-
![Alert criteria](./media/howto-analyze-activity-logs-log-analytics/alertcriteria.png)
93+
1. On the **Actions** tab, select the **Action Group** that will receive the alert when the signal occurs.
94+
- You can choose to notify your team via email or text message, or you could automate the action using webhooks, Azure functions or logic apps.
95+
- Learn more about [creating and managing alert groups in the Azure portal](../../azure-monitor/alerts/action-groups.md).
8896

89-
3. Enter a name and description for the alert, and choose the severity level. For our example, we could set it to **Informational**.
97+
1. On the **Details** tab, give the alert rule a name and associate it with a subscription and resource group.
9098

91-
4. Select the **Action Group** that will be alerted when the signal occurs. You can choose to notify your team via email or text message, or you could automate the action using webhooks, Azure functions or logic apps. Learn more about [creating and managing alert groups in the Azure portal](../../azure-monitor/alerts/action-groups.md).
99+
1. After configuring all necessary details, select the **Review + Create** button.
92100

93-
5. Once you've configured the alert, select **Create alert** to enable it.
101+
## Use workbooks to analyze logs
94102

95-
## Use pre-built workbooks for Azure AD activity logs
103+
Azure AD workbooks provide several reports related to common scenarios involving audit, sign-in, and provisioning events. *You can also alert on any of the data provided in the reports, using the steps described in the previous section.*
96104

97-
The workbooks provide several reports related to common scenarios involving audit, sign-in, and provisioning events. You can also alert on any of the data provided in the reports, using the steps described in the previous section.
105+
* **Provisioning analysis:** This workbook shows reports related to auditing provisioning activity. Activities can include the number of new users provisioned, provisioning failures, number of users updated, update failures, the number of users deprovisioned, and corresponding failures. For more information, see [Understand how provisioning integrates with Azure Monitor logs](../app-provisioning/application-provisioning-log-analytics.md).
98106

99-
* **Provisioning analysis**: This [workbook](../app-provisioning/application-provisioning-log-analytics.md) shows reports related to auditing provisioning activity. Activities can include the number of new users provisioned, provisioning failures, number of users updated, update failures, the number of users de-provisioned, and corresponding failures.
100107
* **Sign-ins Events**: This workbook shows the most relevant reports related to monitoring sign-in activity, such as sign-ins by application, user, device, and a summary view tracking the number of sign-ins over time.
101-
* **Conditional access insights**: The Conditional Access insights and reporting [workbook](../conditional-access/howto-conditional-access-insights-reporting.md) enables you to understand the effect of Conditional Access policies in your organization over time.
108+
109+
* **Conditional access insights**: The Conditional Access insights and reporting workbook enables you to understand the effect of Conditional Access policies in your organization over time. For more information, see [Conditional Access insights and reporting](../conditional-access/howto-conditional-access-insights-reporting.md).
102110

103111
## Next steps
104112

105113
* [Get started with queries in Azure Monitor logs](../../azure-monitor/logs/get-started-queries.md)
106114
* [Create and manage alert groups in the Azure portal](../../azure-monitor/alerts/action-groups.md)
107-
* [Install and use the log analytics views for Azure Active Directory](howto-install-use-log-analytics-views.md)

0 commit comments

Comments
 (0)