Skip to content

Commit d32a860

Browse files
Merge pull request #247685 from shlipsey3/reports-refresh-080823
reports-refresh-080823
2 parents 5818168 + ee799c7 commit d32a860

32 files changed

+702
-738
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 55 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5265,6 +5265,61 @@
52655265
"redirect_url": "/azure/active-directory/fundamentals/concept-fundamentals-security-defaults",
52665266
"redirect_document_id": true
52675267
},
5268+
{
5269+
"source_path_from_root": "/articles/active-directory/reports-monitoring/howto-use-azure-monitor-workbooks.md",
5270+
"redirect_url": "/azure/active-directory/reports-monitoring/howto-use-workbooks",
5271+
"redirect_document_id": true
5272+
},
5273+
{
5274+
"source_path_from_root": "/articles/active-directory/reports-monitoring/concept-activity-logs-azure-monitor.md",
5275+
"redirect_url": "/azure/active-directory/reports-monitoring/concept-log-monitoring-integration-options-considerations",
5276+
"redirect_document_id": true
5277+
},
5278+
{
5279+
"source_path_from_root": "/articles/active-directory/reports-monitoring/tutorial-log-analytics-wizard.md",
5280+
"redirect_url": "/azure/active-directory/reports-monitoring/tutorial-configure-log-analytics-workspace",
5281+
"redirect_document_id": true
5282+
},
5283+
{
5284+
"source_path_from_root": "/articles/active-directory/reports-monitoring/quickstart-azure-monitor-route-logs-to-storage-account.md",
5285+
"redirect_url": "/azure/active-directory/reports-monitoring/howto-archive-logs-to-storage-account",
5286+
"redirect_document_id": true
5287+
},
5288+
{
5289+
"source_path_from_root": "/articles/active-directory/reports-monitoring/overview-monitoring.md",
5290+
"redirect_url": "/azure/active-directory/reports-monitoring/overview-monitoring-health",
5291+
"redirect_document_id": false
5292+
},
5293+
{
5294+
"source_path_from_root": "/articles/active-directory/reports-monitoring/overview-reports.md",
5295+
"redirect_url": "/azure/active-directory/reports-monitoring/overview-monitoring-health",
5296+
"redirect_document_id": true
5297+
},
5298+
{
5299+
"source_path_from_root": "/articles/active-directory/reports-monitoring/howto-integrate-activity-logs-with-sumologic.md",
5300+
"redirect_url": "/azure/active-directory/reports-monitoring/howto-stream-logs-to-event-hub",
5301+
"redirect_document_id": true
5302+
},
5303+
{
5304+
"source_path_from_root": "/articles/active-directory/reports-monitoring/howto-integrate-activity-logs-with-splunk.md",
5305+
"redirect_url": "/azure/active-directory/reports-monitoring/howto-stream-logs-to-event-hub",
5306+
"redirect_document_id": false
5307+
},
5308+
{
5309+
"source_path_from_root": "/articles/active-directory/reports-monitoring/howto-integrate-activity-logs-with-arcsight.md",
5310+
"redirect_url": "/azure/active-directory/reports-monitoring/howto-stream-logs-to-event-hub",
5311+
"redirect_document_id": false
5312+
},
5313+
{
5314+
"source_path_from_root": "/articles/active-directory/reports-monitoring/howto-integrate-activity-logs-with-log-analytics.md",
5315+
"redirect_url": "/azure/active-directory/reports-monitoring/howto-integrate-activity-logs-with-azure-monitor-logs",
5316+
"redirect_document_id": true
5317+
},
5318+
{
5319+
"source_path_from_root": "/articles/active-directory/reports-monitoring/overview-service-health-notifications.md",
5320+
"redirect_url": "/azure/service-health/service-health-portal-update",
5321+
"redirect_document_id": true
5322+
},
52685323
{
52695324
"source_path_from_root": "/articles/active-directory/reports-monitoring/quickstart-configure-named-locations.md",
52705325
"redirect_url": "/azure/active-directory/conditional-access/location-condition",
Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
---
2+
title: include file
3+
description: include file
4+
author: shlipsey3
5+
manager: amycolannino
6+
ms.service: active-directory
7+
ms.workload: identity
8+
ms.topic: include
9+
ms.date: 08/08/2023
10+
ms.author: saralipsey
11+
ms.custom: include file
12+
---
13+
14+
1. Sign in to the [Azure portal](https://portal.azure.com) as a **Security Administrator**.
15+
16+
1. Go to **Azure Active Directory** > **Diagnostic settings**. You can also select **Export Settings** from either the **Audit Logs** or **Sign-ins** page.
17+
18+
1. Select **+ Add diagnostic setting** to create a new integration or select **Edit setting** for an existing integration.
19+
20+
1. Enter a **Diagnostic setting name**. If you're editing an existing integration, you can't change the name.
21+
22+
1. Select the log categories that you want to stream.
Lines changed: 98 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,98 @@
1+
---
2+
3+
title: Logs available for streaming to endpoints from Azure Active Directory
4+
description: Learn about the Azure Active Directory logs available for streaming to an endpoint for storage, analysis, or monitoring.
5+
services: active-directory
6+
author: shlipsey3
7+
manager: amycolannino
8+
ms.service: active-directory
9+
ms.topic: conceptual
10+
ms.workload: identity
11+
ms.subservice: report-monitor
12+
ms.date: 08/09/2023
13+
ms.author: sarahlipsey
14+
ms.reviewer: besiler
15+
16+
---
17+
18+
# Learn about the identity logs you can stream to an endpoint
19+
20+
Using Diagnostic settings in Azure Active Directory (Azure AD), you can route activity logs to several endpoints for long term retention and data insights. You select the logs you want to route, then select the endpoint.
21+
22+
This article describes the logs that you can route to an endpoint from Azure AD Diagnostic settings.
23+
24+
## Prerequisites
25+
26+
Setting up an endpoint, such as an event hub or storage account, may require different roles and licenses. To create or edit a new Diagnostic setting, you need a user who's a **Security Administrator** or **Global Administrator** for the Azure AD tenant.
27+
28+
To help decide which log routing option is best for you, see [How to access activity logs](howto-access-activity-logs.md). The overall process and requirements for each endpoint type are covered in the following articles.
29+
30+
- [Send logs to a Log Analytics workspace to integrate with Azure Monitor logs](howto-integrate-activity-logs-with-azure-monitor-logs.md)
31+
- [Archive logs to a storage account](howto-archive-logs-to-storage-account.md)
32+
- [Stream logs to an event hub](howto-stream-logs-to-event-hub.md)
33+
- [Send to a partner solution](../../partner-solutions/overview.md)
34+
35+
## Activity log options
36+
37+
The following logs can be sent to an endpoint. Some logs may be in public preview but still visible in the portal.
38+
39+
### Audit logs
40+
41+
The `AuditLogs` report capture changes to applications, groups, users, and licenses in your Azure AD tenant. Once you've routed your audit logs, you can filter or analyze by date/time, the service that logged the event, and who made the change. For more information, see [Audit logs](concept-audit-logs.md).
42+
43+
### Sign-in logs
44+
45+
The `SignInLogs` send the interactive sign-in logs, which are logs generated by your users signing in. Sign-in logs are generated by users providing their username and password on an Azure AD sign-in screen or passing an MFA challenge. For more information, see [Interactive user sign-ins](concept-all-sign-ins.md#interactive-user-sign-ins).
46+
47+
### Non-interactive sign-in logs
48+
49+
The `NonInteractiveUserSIgnInLogs` are sign-ins done on behalf of a user, such as by a client app. The device or client uses a token or code to authenticate or access a resource on behalf of a user. For more information, see [Non-interactive user sign-ins](concept-all-sign-ins.md#non-interactive-user-sign-ins).
50+
51+
### Service principal sign-in logs
52+
53+
If you need to review sign-in activity for apps or service principals, the `ServicePrincipalSignInLogs` may be a good option. In these scenarios, certificates or client secrets are used for authentication. For more information, see [Service principal sign-ins](concept-all-sign-ins.md#service-principal-sign-ins).
54+
55+
### Managed identity sign-in logs
56+
57+
The `ManagedIdentitySignInLogs` provide similar insights as the service principal sign-in logs, but for managed identities, where Azure manages the secrets. For more information, see [Managed identity sign-ins](concept-all-sign-ins.md#managed-identity-for-azure-resources-sign-ins).
58+
59+
### Provisioning logs
60+
61+
If your organization provisions users through a third-party application such as Workday or ServiceNow, you may want to export the `ProvisioningLogs` reports. For more information, see [Provisioning logs](concept-provisioning-logs.md).
62+
63+
### AD FS sign-in logs
64+
65+
Sign-in activity for Active Directory Federated Services (AD FS) applications are captured in this Usage and insight reports. You can export the `ADFSSignInLogs` report to monitor sign-in activity for AD FS applications. For more information, see [AD FS sign-in logs](concept-usage-insights-report.md#ad-fs-application-activity).
66+
67+
### Risky users
68+
69+
The `RiskyUsers` logs identify users who are at risk based on their sign-in activity. This report is part of Azure AD Identity Protection and uses sign-in data from Azure AD. For more information, see [What is Azure AD Identity Protection?](../identity-protection/overview-identity-protection.md).
70+
71+
### User risk events
72+
73+
The `UserRiskEvents` logs are part of Azure AD Identity Protection. These logs capture details about risky sign-in events. For more information, see [How to investigate risk](../identity-protection/howto-identity-protection-investigate-risk.md#risky-sign-ins).
74+
75+
### Risky service principals
76+
77+
The `RiskyServicePrincipals` logs provide information about service principals that Azure AD Identity Protection detected as risky. Service principal risk represents the probability that an identity or account is compromised. These risks are calculated asynchronously using data and patterns from Microsoft's internal and external threat intelligence sources. These sources may include security researchers, law enforcement professionals, and security teams at Microsoft. For more information, see [Securing workload identities](../identity-protection/concept-workload-identity-risk.md)
78+
79+
### Service principal risk events
80+
81+
The `ServicePrincipalRiskEvents` logs provide details around the risky sign-in events for service principals. These logs may include any identified suspicious events related to the service principal accounts. For more information, see [Securing workload identities](../identity-protection/concept-workload-identity-risk.md)
82+
83+
### Enriched Microsoft 365 audit logs
84+
85+
The `EnrichedOffice365AuditLogs` logs are associated with the enriched logs you can enable for Microsoft Entra Internet Access. Selecting this option doesn't add new logs to your workspace unless your organization is using Microsoft Entra Internet to secure access to your Microsoft 365 traffic *and* you enabled the enriched logs. For more information, see [How to use the Global Secure Access enriched Microsoft 365 logs](../../global-secure-access/how-to-view-enriched-logs.md).
86+
87+
### Microsoft Graph activity logs
88+
89+
The `MicrosoftGraphActivityLogs` logs are associated with a feature that is still in preview. The logs are visible in Azure AD, but selecting these options won't add new logs to your workspace unless your organization was included in the preview.
90+
91+
### Network access traffic logs
92+
93+
The `NetworkAccessTrafficLogs` logs are associated with Microsoft Entra Internet Access and Microsoft Entra Private Access. The logs are visible in Azure AD, but selecting this option doesn't add new logs to your workspace unless your organization is using Microsoft Entra Internet Access and Microsoft Entra Private Access to secure access to your corporate resources. For more information, see [What is Global Secure Access?](../../global-secure-access/overview-what-is-global-secure-access.md).
94+
95+
## Next steps
96+
97+
- [Learn about the sign-ins logs](concept-all-sign-ins.md)
98+
- [Explore how to access the activity logs](howto-access-activity-logs.md)

articles/active-directory/reports-monitoring/concept-activity-logs-azure-monitor.md renamed to articles/active-directory/reports-monitoring/concept-log-monitoring-integration-options-considerations.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,16 @@
11
---
2-
title: Azure Active Directory activity log integration options
3-
description: Introduction to the options for integrating Azure Active Directory activity logs with storage and analysis tools.
2+
title: Azure Active Directory activity log integration options and considerations
3+
description: Introduction to the options and considerations for integrating Azure Active Directory activity logs with storage and analysis tools.
44
services: active-directory
55
author: shlipsey3
66
manager: amycolannino
77
ms.service: active-directory
88
ms.topic: conceptual
99
ms.workload: identity
1010
ms.subservice: report-monitor
11-
ms.date: 07/27/2023
11+
ms.date: 08/09/2023
1212
ms.author: sarahlipsey
1313
ms.reviewer: besiler
14-
ms.collection: M365-identity-device-management
1514
---
1615
# Azure AD activity log integrations
1716

articles/active-directory/reports-monitoring/howto-access-activity-logs.md

Lines changed: 8 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,23 +1,21 @@
11
---
22
title: Access activity logs in Azure AD
3-
description: Learn how to choose the right method for accessing the activity logs in Azure AD.
3+
description: Learn how to choose the right method for accessing the activity logs in Azure Active Directory.
44
services: active-directory
55
author: shlipsey3
66
manager: amycolannino
77
ms.service: active-directory
88
ms.topic: how-to
99
ms.workload: identity
1010
ms.subservice: report-monitor
11-
ms.date: 07/26/2023
11+
ms.date: 08/08/2023
1212
ms.author: sarahlipsey
1313
ms.reviewer: besiler
14-
15-
ms.collection: M365-identity-device-management
1614
---
1715

18-
# How To: Access activity logs in Azure AD
16+
# How to access activity logs in Azure AD
1917

20-
The data in your Azure Active Directory (Azure AD) logs enables you to assess many aspects of your Azure AD tenant. To cover a broad range of scenarios, Azure AD provides you with various options to access your activity log data. As an IT administrator, you need to understand the intended uses cases for these options, so that you can select the right access method for your scenario.
18+
The data collected in your Azure Active Directory (Azure AD) logs enables you to assess many aspects of your Azure AD tenant. To cover a broad range of scenarios, Azure AD provides you with several options to access your activity log data. As an IT administrator, you need to understand the intended uses cases for these options, so that you can select the right access method for your scenario.
2119

2220
You can access Azure AD activity logs and reports using the following methods:
2321

@@ -34,7 +32,7 @@ Each of these methods provides you with capabilities that may align with certain
3432

3533
## Prerequisites
3634

37-
The required roles and licenses may vary based on the report. Global Administrator can access all reports, but we recommend using a role with least privilege access to align with the [Zero Trust guidance](/security/zero-trust/zero-trust-overview).
35+
The required roles and licenses may vary based on the report. Global Administrators can access all reports, but we recommend using a role with least privilege access to align with the [Zero Trust guidance](/security/zero-trust/zero-trust-overview).
3836

3937
| Log / Report | Roles | Licenses |
4038
|--|--|--|
@@ -44,7 +42,7 @@ The required roles and licenses may vary based on the report. Global Administrat
4442
| Usage and insights | Security Reader<br>Reports Reader<br> Security Administrator | Premium P1/P2 |
4543
| Identity Protection* | Security Administrator<br>Security Operator<br>Security Reader<br>Global Reader | Azure AD Free/Microsoft 365 Apps<br>Azure AD Premium P1/P2 |
4644

47-
*The level of access and capabilities for Identity Protection varies with the role and license. For more information, see the [license requirements for Identity Protection](../identity-protection/overview-identity-protection.md#license-requirements).
45+
*The level of access and capabilities for Identity Protection vary with the role and license. For more information, see the [license requirements for Identity Protection](../identity-protection/overview-identity-protection.md#license-requirements).
4846

4947
Audit logs are available for features that you've licensed. To access the sign-ins logs using the Microsoft Graph API, your tenant must have an Azure AD Premium license associated with it.
5048

@@ -72,7 +70,7 @@ The SIEM tools you can integrate with your event hub can provide analysis and mo
7270

7371
## Access logs with Microsoft Graph API
7472

75-
The Microsoft Graph API provides a unified programmability model that you can use to access data for your Azure AD Premium tenants. It doesn't require an administrator or developer to set up extra infrastructure to support your script or app. The Microsoft Graph API is **not** designed for pulling large amounts of activity data. Pulling large amounts of activity data using the API may lead to issues with pagination and performance.
73+
The Microsoft Graph API provides a unified programmability model that you can use to access data for your Azure AD Premium tenants. It doesn't require an administrator or developer to set up extra infrastructure to support your script or app.
7674

7775
### Recommended uses
7876

@@ -201,7 +199,7 @@ We recommend manually downloading and storing your activity logs if you have bud
201199

202200
Use the following basic steps to archive or download your activity logs.
203201

204-
### Archive activity logs to a storage account
202+
#### Archive activity logs to a storage account
205203

206204
1. Sign in to the [Azure portal](https://portal.azure.com) using one of the required roles.
207205
1. Create a storage account.
Lines changed: 53 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,53 @@
1+
---
2+
title: How to archive activity logs to a storage account
3+
description: Learn how to archive Azure Active Directory logs to a storage account
4+
services: active-directory
5+
author: shlipsey3
6+
manager: amycolannino
7+
ms.service: active-directory
8+
ms.topic: how-to
9+
ms.workload: identity
10+
ms.subservice: report-monitor
11+
ms.date: 08/09/2023
12+
ms.author: sarahlipsey
13+
ms.reviewer: besiler
14+
15+
# Customer intent: As an IT administrator, I want to learn how to archive Azure AD logs to an Azure storage account so I can retain it for longer than the default retention period.
16+
17+
---
18+
# How to archive Azure AD logs to an Azure storage account
19+
20+
If you need to store Azure Active Directory (Azure AD) activity logs for longer than the [default retention period](reference-reports-data-retention.md), you can archive your logs to a storage account.
21+
22+
## Prerequisites
23+
24+
To use this feature, you need:
25+
26+
* An Azure subscription with an Azure storage account. If you don't have an Azure subscription, you can [sign up for a free trial](https://azure.microsoft.com/free/).
27+
* A user who's a *Security Administrator* or *Global Administrator* for the Azure AD tenant.
28+
29+
## Archive logs to an Azure storage account
30+
31+
[!INCLUDE [diagnostic-settings-include](../includes/diagnostic-settings-include.md)]
32+
33+
6. Under **Destination Details** select the **Archive to a storage account** check box.
34+
35+
7. Select the appropriate **Subscription** and **Storage account** from the menus.
36+
37+
![Diagnostics settings](media/howto-archive-logs-to-storage-account/diagnostic-settings-storage.png)
38+
39+
8. After the categories have been selected, in the **Retention days** field, type in the number of days of retention you need of your log data. By default, this value is *0*, which means that logs are retained in the storage account indefinitely. If you set a different value, events older than the number of days selected are automatically cleaned up.
40+
41+
> [!NOTE]
42+
> The Diagnostic settings storage retention feature is being deprecated. For details on this change, see [**Migrate from diagnostic settings storage retention to Azure Storage lifecycle management**](../../azure-monitor/essentials/migrate-to-azure-storage-lifecycle-policy.md).
43+
44+
9. Select **Save** to save the setting.
45+
46+
10. Close the window to return to the Diagnostic settings pane.
47+
48+
## Next steps
49+
50+
- [Learn about other ways to access activity logs](howto-access-activity-logs.md)
51+
- [Manually download activity logs](howto-download-logs.md)
52+
- [Integrate activity logs with Azure Monitor logs](howto-integrate-activity-logs-with-azure-monitor-logs.md)
53+
- [Stream logs to an event hub](howto-stream-logs-to-event-hub.md)

0 commit comments

Comments
 (0)