Azure AD Log Analytics and Monitoring

Audit logs on Azure AD to optimize security efforts

Correlate Azure AD log data across Azure AD activity logs

Correlate Azure AD log data across Azure AD activity logs

SolarWinds® Security Event Manager (SEM) is designed to process Azure Active Directory (AD) activity logs—including audit logs, sign-in logs, and provisioning logs—and bring them together in a single place to simplify analysis.

SEM can also help facilitate easier Azure AD log and event correlation, so you can quickly investigate potential threats and suspicious activity with the ability to set event-time correlation rules to initiate active responses to triggered thresholds.

Enable continuous Azure AD log analytics monitoring

Enable continuous Azure AD log analytics monitoring

SEM enables you to continuously monitor Azure AD log analytics in real time, so you can respond to unusual activity and incidents as soon as they arise. You can keep a constant watch on Azure Active Directory logs, files, and folders using SIEM capabilities to track changes and identify suspicious modifications. Consistent Azure AD log analytics monitoring can help you more easily mitigate threats, vulnerabilities, and other risks in a timely manner and without compromising operations.

Set integrated alerts and notifications to aid threat detection

Set integrated alerts and notifications to aid threat detection

SEM is designed to leverage Azure Active Directory log alarms and notifications, which can let you know of detected threats as soon as possible. SEM enables you to initiate real-time remediation efforts as soon as certain thresholds are crossed, which can help expedite time to resolution.

SEM real-time alerts can also identify forced attempts to bypass firewalls, misconfigurations, malicious IPs, and repeated login failures followed by a success using predefined rules or by customizing your own thresholds.

Access compliance reporting to demonstrate Azure AD adherence to industry regulations

Access compliance reporting to demonstrate Azure AD adherence to industry regulations

SEM is built to provide you with integrated compliance reporting, which can help simplify Azure Active Directory compliance audits. SEM can also help you demonstrate compliance for industry-specific regulations including SOX, HIPAA, and more with the ability to automate and schedule reports. The centralized log repository in SEM is also designed to help you improve your compliance risk management by supporting your ability to more easily validate regulations, controls, and implementation of internal policies to identify gaps.

Search for relevant Azure AD activity logs to spot problems

Search for relevant Azure AD activity logs to spot problems

SEM provides advanced search capabilities to help you identify potential Azure Active Directory security risks and policy violations before they become issues. SEM leverages searchable visualizations and fields through an intuitive UI, enabling you to quickly view categories like object access, policy modifications, and logon/logoff events. Instead of manually sorting through thousands of Azure AD activity logs, you can more easily manage Azure AD log analytics with built-in filter and search functions.
Get More on Azure AD Log Analytics
Do you find yourself asking…
  • What is Azure AD?
  • What are Azure AD logs?
  • Why is Azure AD activity log analytics important?
  • How to audit and analyze Azure AD logs with SolarWinds Security Event Manager
  • Related Features and Tools
  • What is Azure AD?

    Azure AD, which is short for Azure Active Directory, is the Microsoft cloud-based identity and access management solution. Azure AD is also used as the directory service for Microsoft 365. Azure Active Directory is built to bring all these logs together, giving you a comprehensive view of your system activity. Use these Azure AD log analytics to gain critical insights into the performance of your IT infrastructure.

  • What are Azure AD logs?

    Azure Active Directory logs collect events having to do with user, group, application, domain, and directory activities as performed from the Microsoft 365 admin center or in the Azure management portal. There are three kinds of Azure AD activity logs:

    1. Audit logs - Azure Active Directory AD audit logs record the history of your task activity, including modifications to Azure resources such as adding or removing users, applications, groups, policies, and roles. Azure AD audit logs default information displays:
      • Date and time of an occurrence
      • Which service logged an occurrence
      • Category and name of the activity
      • Activity status (success or failure)
      • Target, initiator, and actor of an activity
    2. Provisioning logs - Analysis of Azure AD provisioning logs can enable you to better understand activities performed by the provisioning service. This includes the creation of a new group and creating or deleting a user. Azure AD provisioning logs default view includes the identity, action, source system, target system, status, and date of a provisioning event.
    3. Sign-in logs - Azure AD sign-in logs track information on user sign-in activities and overall application usage. You can use Azure AD sign-ins to understand a particular user’s sign-in pattern, view how many users total have signed into an application, and learn the status of these individual sign-ins. Sign-ins on Azure AD activity logs default to display:
      • Sign-in date and related user
      • Which application the user has signed in to
      • Sign-in status and risk detection status
      • Status of multi-factor authentication (MFA) requirements

  • Why is Azure AD activity log analytics important?

    Collecting and analyzing Azure AD activity log activity can help you more easily maintain the health and performance of Azure AD. You can use Azure Active Directory log analytics to better interpret events occurring in your network and correlate data across your infrastructure sources to more easily discover trends.

    By gathering and monitoring Azure Active Directory logs consistently, you can generate more comprehensive, up-to-date log analytics. Azure AD log analytics also present you with metrics to help you investigate security incidents.

    With Azure AD log analytics, you can gain clearer insights into potential privileged account abuse by understanding user access and Azure AD activity. You can leverage specific identity and access modifications information—including the date, time, and actor for each change—to help you more quickly detect potential security threats using Azure AD log analytics notifications, alerts, and alarms.

    Combining Azure AD log analytics with your security information and event management (SIEM) efforts by sending Azure AD audit logs to a SIEM tool can help you more easily stay on top of security incidents and generate reports to help you demonstrate compliance.

     

  • How to audit and analyze Azure AD logs with SolarWinds Security Event Manager

    Audit and analyze Azure Active Directory logs with SolarWinds Security Event Manager (SEM) by collecting actions and events from Microsoft Azure Active Directory. SEM enables you to monitor, analyze, and visualize data taken from Azure Active Directory activity logs and audit logs, giving you greater visibility into historical and real-time Azure Active Directory operations.

    SEM is designed to monitor for and can alert on potentially suspicious log activities in Azure Active Directory, such as adding or deleting user accounts, editing specific access privileges, changes to passwords and policies, user logins, and permission grants to applications to help you more quickly detect security issues.

    SEM can also help you more easily correlate actions from across cloud and on-premises Active Directory audit logs to create a centralized view of activity in your hybrid environments for more effective log monitoring, analysis, and storage. This intuitive UI can enable you to access and compare logs to gain insights using searchable fields and interactive graphs more easily.

    SEM also enables you to automate report creation, change alerts, and incident responses. SEM includes hundreds of out-of-the-box reports you can use to view events, trends, and make more informed decisions about network activity and security, including critical logon and logoff events to help you more easily identify potential brute force cyberattacks.

  • Related Features and Tools

    Other SolarWinds tools to help monitor Azure AD:


    Related features:

What is Azure AD?

Azure AD, which is short for Azure Active Directory, is the Microsoft cloud-based identity and access management solution. Azure AD is also used as the directory service for Microsoft 365. Azure Active Directory is built to bring all these logs together, giving you a comprehensive view of your system activity. Use these Azure AD log analytics to gain critical insights into the performance of your IT infrastructure.

Close
What are Azure AD logs?

Azure Active Directory logs collect events having to do with user, group, application, domain, and directory activities as performed from the Microsoft 365 admin center or in the Azure management portal. There are three kinds of Azure AD activity logs:

  1. Audit logs - Azure Active Directory AD audit logs record the history of your task activity, including modifications to Azure resources such as adding or removing users, applications, groups, policies, and roles. Azure AD audit logs default information displays:
    • Date and time of an occurrence
    • Which service logged an occurrence
    • Category and name of the activity
    • Activity status (success or failure)
    • Target, initiator, and actor of an activity
  2. Provisioning logs - Analysis of Azure AD provisioning logs can enable you to better understand activities performed by the provisioning service. This includes the creation of a new group and creating or deleting a user. Azure AD provisioning logs default view includes the identity, action, source system, target system, status, and date of a provisioning event.
  3. Sign-in logs - Azure AD sign-in logs track information on user sign-in activities and overall application usage. You can use Azure AD sign-ins to understand a particular user’s sign-in pattern, view how many users total have signed into an application, and learn the status of these individual sign-ins. Sign-ins on Azure AD activity logs default to display:
    • Sign-in date and related user
    • Which application the user has signed in to
    • Sign-in status and risk detection status
    • Status of multi-factor authentication (MFA) requirements

Close
Why is Azure AD activity log analytics important?

Collecting and analyzing Azure AD activity log activity can help you more easily maintain the health and performance of Azure AD. You can use Azure Active Directory log analytics to better interpret events occurring in your network and correlate data across your infrastructure sources to more easily discover trends.

By gathering and monitoring Azure Active Directory logs consistently, you can generate more comprehensive, up-to-date log analytics. Azure AD log analytics also present you with metrics to help you investigate security incidents.

With Azure AD log analytics, you can gain clearer insights into potential privileged account abuse by understanding user access and Azure AD activity. You can leverage specific identity and access modifications information—including the date, time, and actor for each change—to help you more quickly detect potential security threats using Azure AD log analytics notifications, alerts, and alarms.

Combining Azure AD log analytics with your security information and event management (SIEM) efforts by sending Azure AD audit logs to a SIEM tool can help you more easily stay on top of security incidents and generate reports to help you demonstrate compliance.

 

Close
How to audit and analyze Azure AD logs with SolarWinds Security Event Manager

Audit and analyze Azure Active Directory logs with SolarWinds Security Event Manager (SEM) by collecting actions and events from Microsoft Azure Active Directory. SEM enables you to monitor, analyze, and visualize data taken from Azure Active Directory activity logs and audit logs, giving you greater visibility into historical and real-time Azure Active Directory operations.

SEM is designed to monitor for and can alert on potentially suspicious log activities in Azure Active Directory, such as adding or deleting user accounts, editing specific access privileges, changes to passwords and policies, user logins, and permission grants to applications to help you more quickly detect security issues.

SEM can also help you more easily correlate actions from across cloud and on-premises Active Directory audit logs to create a centralized view of activity in your hybrid environments for more effective log monitoring, analysis, and storage. This intuitive UI can enable you to access and compare logs to gain insights using searchable fields and interactive graphs more easily.

SEM also enables you to automate report creation, change alerts, and incident responses. SEM includes hundreds of out-of-the-box reports you can use to view events, trends, and make more informed decisions about network activity and security, including critical logon and logoff events to help you more easily identify potential brute force cyberattacks.

Close
Related Features and Tools

Monitor Azure AD activity logs to track critical changes

Security Event Manager

  • More easily correlate Azure AD logs and search for specific details

  • Continuously gather Azure AD log analytics

  • Simplify demonstrating compliance with hundreds of out-of-the-box reports

Starts at {#Product Price#} Subscription and Perpetual Licensing options available
Let’s talk it over.
Contact our team. Anytime.
{#Contact Phone#}
{{STATIC CONTENT}}
{{CAPTION_TITLE}}

{{CAPTION_CONTENT}}

{{TITLE}}