Skip to content

Commit f71e945

Browse files
authored
Merge pull request #216627 from shlipsey3/reports-monitoring-tutorial-ownership-103122
update-ownership-tutorials
2 parents d490674 + 5678a02 commit f71e945

File tree

3 files changed

+27
-36
lines changed

3 files changed

+27
-36
lines changed

articles/active-directory/reports-monitoring/tutorial-access-api-with-certificates.md

Lines changed: 17 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -2,44 +2,41 @@
22
title: Tutorial for AD Reporting API with certificates | Microsoft Docs
33
description: This tutorial explains how to use the Azure AD Reporting API with certificate credentials to get data from directories without user intervention.
44
services: active-directory
5-
documentationcenter: ''
6-
author: MarkusVi
5+
author: shlipsey3
76
manager: amycolannino
8-
9-
ms.assetid:
107
ms.service: active-directory
118
ms.workload: identity
12-
ms.tgt_pltfrm: na
139
ms.topic: tutorial
1410
ms.subservice: report-monitor
15-
ms.date: 08/26/2022
16-
ms.author: markvi
11+
ms.date: 10/31/2022
12+
ms.author: sarahlipsey
1713
ms.reviewer: dhanyahk
18-
19-
# Customer intent: As a developer, I want to learn how to access the Azure AD reporting API using certificates so that I can create an application that does not require user intervention to access reports.
2014
ms.collection: M365-identity-device-management
2115
ms.custom: has-adal-ref
16+
17+
# Customer intent: As a developer, I want to learn how to access the Azure AD reporting API using certificates so that I can create an application that does not require user intervention to access reports.
18+
2219
---
2320

2421
# Tutorial: Get data using the Azure Active Directory reporting API with certificates
2522

26-
The [Azure Active Directory (Azure AD) reporting APIs](concept-reporting-api.md) provide you with programmatic access to the data through a set of REST-based APIs. You can call these APIs from a variety of programming languages and tools. If you want to access the Azure AD Reporting API without user intervention, you must configure your access to use certificates.
23+
The [Azure Active Directory (Azure AD) reporting APIs](concept-reporting-api.md) provide you with programmatic access to the data through a set of REST-based APIs. You can call these APIs from various programming languages and tools. If you want to access the Azure AD Reporting API without user intervention, you must configure your access to use certificates.
2724

2825
In this tutorial, you learn how to use a test certificate to access the MS Graph API for reporting. We don't recommend using test certificates in a production environment.
2926

3027
## Prerequisites
3128

32-
1. To access sign-in data, make sure you have an Azure Active Directory tenant with a premium (P1/P2) license. See [Getting started with Azure Active Directory Premium](../fundamentals/active-directory-get-started-premium.md) to upgrade your Azure Active Directory edition. Note that if you did not have any activities data prior to the upgrade, it will take a couple of days for the data to show up in the reports after you upgrade to a premium license.
29+
1. To access sign-in data, make sure you have an Azure AD tenant with a premium (P1/P2) license. See [Getting started with Azure Active Directory Premium](../fundamentals/active-directory-get-started-premium.md) to upgrade your Azure AD edition. If you didn't have any activities data prior to the upgrade, it will take a couple of days for the data to show up in the reports after you upgrade to a premium license.
3330

34-
2. Create or switch to a user account in the **global administrator**, **security administrator**, **security reader** or **report reader** role for the tenant.
31+
2. Create or switch to a user account in the **Global Administrator**, **Security Administrator**, **Security Reader** or **Report Reader** role for the tenant.
3532

3633
3. Complete the [prerequisites to access the Azure Active Directory reporting API](howto-configure-prerequisites-for-reporting-api.md).
3734

3835
4. Download and install [Azure AD PowerShell V2](https://github.com/Azure/azure-docs-powershell-azuread/blob/master/docs-conceptual/azureadps-2.0/install-adv2.md).
3936

4037
5. Install [MSCloudIdUtils](https://www.powershellgallery.com/packages/MSCloudIdUtils/). This module provides several utility cmdlets including:
41-
- The ADAL libraries needed for authentication
42-
- Access tokens from user, application keys, and certificates using ADAL
38+
- The Microsoft Authentication Library libraries needed for authentication
39+
- Access tokens from user, application keys, and certificates using Microsoft Authentication Library
4340
- Graph API handling paged results
4441

4542
6. If it's your first time using the module run **Install-MSCloudIdUtilsModule**, otherwise import it using the **Import-Module** PowerShell command. Your session should look similar to this screen:
@@ -60,13 +57,13 @@ In this tutorial, you learn how to use a test certificate to access the MS Graph
6057

6158
## Get data using the Azure Active Directory reporting API with certificates
6259

63-
1. Navigate to the [Azure portal](https://portal.azure.com), select **Azure Active Directory**, then select **App registrations** and choose your application from the list.
60+
1. Go to the [Azure portal](https://portal.azure.com) > **Azure Active Directory** > **App registrations** and choose your application from the list.
6461

65-
2. Select **Certificates & secrets** under **Manage** section on Application registration blade and select **Upload Certificate**.
62+
2. From the Application registration area, select **Certificates & secrets** under the **Manage** section, and then select **Upload Certificate**.
6663

6764
3. Select the certificate file from the previous step and select **Add**.
6865

69-
4. Note the Application ID, and the thumbprint of the certificate you just registered with your application. To find the thumbprint, from your application page in the portal, go to **Certificates & secrets** under **Manage** section. The thumbprint will be under the **Certificates** list.
66+
4. Note the Application ID, and the thumbprint of the certificate you registered with your application. To find the thumbprint, from your application page in the portal, go to **Certificates & secrets** under **Manage** section. The thumbprint will be under the **Certificates** list.
7067

7168
5. Open the application manifest in the inline manifest editor and verify the *keyCredentials* property is updated with your new certificate information as shown below -
7269

@@ -85,13 +82,13 @@ In this tutorial, you learn how to use a test certificate to access the MS Graph
8582

8683
![Screenshot shows a PowerShell window with a command that creates an access token.](./media/tutorial-access-api-with-certificates/getaccesstoken.png)
8784

88-
7. Use the access token in your PowerShell script to query the Graph API. Use the **Invoke-MSCloudIdMSGraphQuery** cmdlet from the MSCloudIDUtils to enumerate the signins and directoryAudits endpoint. This cmdlet handles multi-paged results, and sends those results to the PowerShell pipeline.
85+
7. Use the access token in your PowerShell script to query the Graph API. Use the **Invoke-MSCloudIdMSGraphQuery** cmdlet from the MSCloudIDUtils to enumerate the `signins` and `directoryAudits` endpoint. This cmdlet handles multi-paged results, and sends those results to the PowerShell pipeline.
8986

90-
8. Query the directoryAudits endpoint to retrieve the audit logs.
87+
8. Query the `directoryAudits` endpoint to retrieve the audit logs.
9188

9289
![Screenshot shows a PowerShell window with a command to query the directoryAudits endpoint using the access token from earlier in this procedure.](./media/tutorial-access-api-with-certificates/query-directoryAudits.png)
9390

94-
9. Query the signins endpoint to retrieve the sign-in logs.
91+
9. Query the `signins` endpoint to retrieve the sign-in logs.
9592

9693
![Screenshot shows a PowerShell window with a command to query the signins endpoint using the access token from earlier in this procedure.](./media/tutorial-access-api-with-certificates/query-signins.png)
9794

articles/active-directory/reports-monitoring/tutorial-azure-monitor-stream-logs-to-event-hub.md

Lines changed: 5 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -2,23 +2,18 @@
22
title: Tutorial - Stream logs to an Azure event hub | Microsoft Docs
33
description: Learn how to set up Azure Diagnostics to push Azure Active Directory logs to an event hub
44
services: active-directory
5-
documentationcenter: ''
6-
author: MarkusVi
5+
author: shlipsey3
76
manager: amycolannino
8-
editor: ''
9-
10-
ms.assetid: 045f94b3-6f12-407a-8e9c-ed13ae7b43a3
117
ms.service: active-directory
128
ms.topic: tutorial
13-
ms.tgt_pltfrm: na
149
ms.workload: identity
1510
ms.subservice: report-monitor
16-
ms.date: 08/26/2022
17-
ms.author: markvi
11+
ms.date: 10/31/2022
12+
ms.author: sarahlipsey
1813
ms.reviewer: besiler
14+
ms.collection: M365-identity-device-management
1915

2016
# Customer intent: As an IT administrator, I want to learn how to route Azure AD logs to an event hub so I can integrate it with my third party SIEM system.
21-
ms.collection: M365-identity-device-management
2217
---
2318
# Tutorial: Stream Azure Active Directory logs to an Azure event hub
2419

@@ -30,7 +25,7 @@ To use this feature, you need:
3025

3126
* An Azure subscription. If you don't have an Azure subscription, you can [sign up for a free trial](https://azure.microsoft.com/free/).
3227
* An Azure AD tenant.
33-
* A user who's a *global administrator* or *security administrator* for the Azure AD tenant.
28+
* A user who's a *Global Administrator* or *Security Administrator* for the Azure AD tenant.
3429
* An Event Hubs namespace and an event hub in your Azure subscription. Learn how to [create an event hub](../../event-hubs/event-hubs-create.md).
3530

3631
## Stream logs to an event hub
@@ -95,6 +90,5 @@ After data is displayed in the event hub, you can access and read the data in tw
9590
* [Integrate Azure Active Directory logs with ArcSight using Azure Monitor](howto-integrate-activity-logs-with-arcsight.md)
9691
* [Integrate Azure AD logs with Splunk by using Azure Monitor](./howto-integrate-activity-logs-with-splunk.md)
9792
* [Integrate Azure AD logs with SumoLogic by using Azure Monitor](howto-integrate-activity-logs-with-sumologic.md)
98-
* [Integrate Azure AD logs with Elastic using an event hub](https://github.com/Microsoft/azure-docs/blob/master/articles/active-directory/reports-monitoring/tutorial-azure-monitor-stream-logs-to-event-hub.md)
9993
* [Interpret audit logs schema in Azure Monitor](./overview-reports.md)
10094
* [Interpret sign-in logs schema in Azure Monitor](reference-azure-monitor-sign-ins-log-schema.md)

articles/active-directory/reports-monitoring/tutorial-log-analytics-wizard.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,10 +6,10 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: report-monitor
88
ms.topic: tutorial
9-
ms.date: 08/26/2022
9+
ms.date: 10/31/2022
1010

11-
ms.author: markvi
12-
author: MarkusVi
11+
ms.author: sarahlipsey
12+
author: shlipsey3
1313
manager: amycolannino
1414
ms.reviewer: sandeo
1515

@@ -33,9 +33,9 @@ In this tutorial, you learn how to:
3333

3434
- An Azure subscription with at least one P1 licensed admin. If you don't have an Azure subscription, you can [sign up for a free trial](https://azure.microsoft.com/free/).
3535

36-
- An Azure AD tenant.
36+
- An Azure Active Directory (Azure AD) tenant.
3737

38-
- A user who's a global administrator or security administrator for the Azure AD tenant.
38+
- A user who's a Global Administrator or Security Administrator for the Azure AD tenant.
3939

4040

4141
Familiarize yourself with these articles:

0 commit comments

Comments
 (0)