Audit activity reports in the Azure Active Directory portal

With Azure Active Directory (Azure AD) reports, you can get the information you need to determine how your environment is doing.

The reporting architecture consists of the following components:

  • Activity
    • Sign-ins – The sign-ins report provides information about the usage of managed applications and user sign-in activities.
    • Audit logs - Provides traceability through logs for all changes done by various features within Azure AD. Examples of audit logs include changes made to any resources within Azure AD like adding or removing users, apps, groups, roles and policies.
  • Security
    • Risky sign-ins - A risky sign-in is an indicator for a sign-in attempt that might have been performed by someone who is not the legitimate owner of a user account.
    • Users flagged for risk - A risky user is an indicator for a user account that might have been compromised.

This article gives you an overview of the audit report.

Who can access the data?

  • Users in the Security Admininistrator, Security Reader or Global Administrator roles
  • In addition, all users (non-administrators) can see their own audit activities

Audit logs

The Azure AD audit logs provide records of system activities for compliance. To access the audit report, select Audit logs in the Activity section of Azure Active Directory. Note that audit logs may have a latency of upto an hour, so it may take that long for audit activity data to show up in the portal after you have completed the task.

Audit logs

An audit log has a default list view that shows:

  • the date and time of the occurrence
  • the initiator / actor (who) of an activity
  • the activity (what)
  • the target

Audit logs

You can customize the list view by clicking Columns in the toolbar.

Audit logs

This enables you to display additional fields or remove fields that are already displayed.

Audit logs

Select an item in the list view to get more detailed information.

Audit logs

Filtering audit logs

You can filter the audit data on the following fields:

  • Date range
  • Initiated by (Actor)
  • Category
  • Activity resource type
  • Activity

Audit logs

The date range filter enables to you to define a timeframe for the returned data.
Possible values are:

  • 1 month
  • 7 days
  • 24 hours
  • Custom

When you select a custom timeframe, you can configure a start time and an end time.

The initiated by filter enables you to define an actor's name or a universal principal name (UPN).

The category filter enables you to select one of the following filter:

  • All
  • Core category
  • Core directory
  • Self-service password management
  • Self-service group management
  • Account provisioning- Automated password rollover
  • Invited users
  • MIM service
  • Identity Protection
  • B2C

The activity resource type filter enables you to select one of the following filters:

  • All
  • Group
  • Directory
  • User
  • Application
  • Policy
  • Device
  • Other

When you select Group as activity resource type, you get an additional filter category that enables you to also provide a Source:

  • Azure AD
  • O365

The activity filter is based on the category and activity resource type selection you make. You can select a specific activity you want to see or choose all.

You can get the list of all Audit Activities using the Graph API$tenantdomain/activities/auditActivityTypes?api-version=beta, where $tenantdomain = your domain name or refer to the article audit report events.

Audit logs shortcuts

In addition to Azure Active Directory, the Azure portal provides you with two additional entry points to audit data:

  • Users and groups
  • Enterprise applications

Users and groups audit logs

With user and group-based audit reports, you can get answers to questions such as:

  • What types of updates have been applied the users?

  • How many users were changed?

  • How many passwords were changed?

  • What has an administrator done in a directory?

  • What are the groups that have been added?

  • Are there groups with membership changes?

  • Have the owners of group been changed?

  • What licenses have been assigned to a group or a user?

If you just want to review auditing data that is related to users and groups, you can find a filtered view under Audit logs in the Activity section of the Users and Groups. This entry point has Users and groups as preselected Activity Resource Type.

Audit logs

Enterprise applications audit logs

With application-based audit reports, you can get answers to questions such as:

  • What applications have been added or updated?
  • What applications have been removed?
  • Has a service principal for an application changed?
  • Have the names of applications been changed?
  • Who gave consent to an application?

If you want to review audit data related to your applications, you can find a filtered view under Audit logs in the Activity section of the Enterprise applications blade. This entry point has Enterprise applications preselected as the Activity Resource Type.

Audit logs

You can filter this view down to groups or users.

Audit logs

Office 365 activity logs

You can view Office 365 activity logs from the Office 365 Admin Center. Even though Office 365 activity and Azure AD activity logs share a lot of the directory resources, only the Office 365 Admin Center provides a full view of the Office 365 activity logs.

You can also access the Office 365 activity logs programmatically using the Office 365 Management APIs.

Next steps