What is Azure Active Directory monitoring? (preview)
With Azure Active Directory (Azure AD) monitoring, you can now route your Azure AD activity logs to different endpoints. You can then either retain it for long-term use or integrate it with third-party Security Information and Event Management (SIEM) tools to gain insights into your environment.
Currently, you can route the logs to:
- An Azure storage account.
- An Azure event hub, so you can integrate with your Splunk and Sumologic instances.
- Azure Log Analytics workspace, wherein you can analyze the data, create dashboard and alert on specific events
Diagnostic settings configuration
To configure monitoring settings for Azure AD activity logs, first sign-in to the Azure portal, then select Azure Active Directory. From here, you can access the diagnostic settings configuration page in two ways:
Select Diagnostic settings from the Monitoring section.
Select Audit Logs or Sign-ins, then select Export settings.
Route logs to storage account
Stream logs to event hub
Routing logs to an Azure event hub allows you to integrate with third-party SIEM tools like Sumologic and Splunk. This integration allows you to combine Azure AD activity log data with other data managed by your SIEM, to provide richer insights into your environment. Learn how to stream logs to an event hub.
Send logs to Log Analytics
Log Analytics is a solution that consolidates monitoring data from different sources and provides a query language and analytics engine that gives you insights into the operation of your applications and resources. By sending Azure AD activity logs to Log Analytics, you can quickly retrieve, monitor and alert on collected data. Learn how to send data to Log Analytics.
You can also install the pre-built views for Azure AD activity logs to monitor common scenarios involving sign-ins and audit events. Learn how to install and use Log Analytics views for Azure AD activity logs.