Azure AD audit log API overview
Azure Active Directory (Azure AD) tracks user activity and sign-in metrics and creates audit log reports that help you understand how your users access and use Azure AD services. Use the Microsoft Graph API for Azure AD to analyze the data underlying these reports and to create custom solutions tailored to your organization's specific needs.
What are Azure AD activity logs?
Azure AD provides two types of activity logs:
- audit logs
- sign-in logs
The audit logs activity report provides you with access to the history of every task performed in your tenant. The audit logs report provides you with records of system activities for compliance. Amongst others, the provided data enables you to address common scenarios such as:
- Who granted admin group access to a directory user?
- Which users are signing in to a recently acquired app?
- How many passwords resets were made within the directory?
The sign-ins activity report helps you determine who performed the tasks reported by audit log reports. The sign-ins activity report helps you answer questions like:
- What is the sign in pattern of a user?
- How many users have signed in during the last week?
- What's the status of these sign-ins?
What can I do with audit log APIs in Microsoft Graph?
The following are popular requests for working with audit log data:
|GET tenant user activities||GET https://graph.microsoft.com/v1.0/auditLogs/directoryAudits|
|GET tenant user sign-ins||GET https://graph.microsoft.com/v1.0/auditLogs/signIns|
What licenses do I need?
Audit log reports are available for features that you've licensed. If you have a license for a specific feature, you also have access to its audit logs.
For example, you need an Azure AD Premium P1 license to access self-service password audit reports. To learn more, see Azure AD licensing.
Sign-in reports require an Azure AD Premium license.
To learn more, see Azure AD pricing.