Skip to main content

Microsoft Entra ID

Understanding Microsoft Entra ID Activity Monitoring

The Activity Monitor can be configured to monitor the following Microsoft Entra ID (formerly Azure AD) changes:

  • Report Sign-In events
  • Reports over 800 audit events in different categories, including:
Administrative UnitApplication ManagementAuthentication
AuthorizationAuthorization PolicyContact
DeviceDevice ConfigurationDirectory Management
Entitlement ManagementGroup ManagementIdentity Protection
Kerberos DomainKey ManagementLabel
Permission Grant PolicyPolicyPolicy Management
Resource ManagementRole ManagementUser Management
  • Reports on audit events across different services, including:
AAD Management UXAccess ReviewsAccount ProvisioningApplication Proxy
Authentication MethodsB2CConditional AccessCore Directory
Device Registration ServiceEntitlement ManagementHybrid AuthenticationIdentity Protection
Invited UsersMIM ServiceMyAppsPIM
Self-Service Group ManagementSelf-service Password ManagementTerms of Use

It also provides the ability to feed activity data to other Netwrix products:

  • Netwrix Access Analyzer (formerly Enterprise Auditor)
  • Netwrix Threat Prevention
  • Netwrix Threat Manager

Prior to adding aMicrosoft Entra ID host to the Activity Monitor, the prerequisites for the target environment must be met. See the Microsoft Entra ID Activity Auditing Configuration topic for additional information.

Remember, the Activity Agent must be deployed to a Windows server that acts as a proxy for monitoring the target environment.

Add Azure Active Directory / Entra ID Host

Follow the steps to add a Microsoft Entra ID host to be monitored.

Step 1 – In the Activity Monitor, go to the Monitored Hosts tab and click Add. The Add New Host window opens.

Add Host - Choose Agent

Step 2 – On the Choose Agent page, select the Agent to monitor the storage device.

Add Host page

Step 3 – On the Add Host page, select the Azure Active Directory / Entra ID radio button and enter the Primary domain in the Domain name field.

(Optional) Enter a comment for the Microsoft Entra ID host.

entraidconnection

Step 4 – On the Azure AD / Entra ID Connection page, enter a Tenant ID, Client ID, and Client Secret. Optional add a Region. Then click Connect to grant permissions to read the audit log. Click Open Instruction... for steps on registering the Activity Monitor with Microsoft Entra ID. Click Next.

Add Host - Azure AD Operations page

Step 5 – On the Azure AD / Entra ID Operations page, select which audit activity to monitor. Click Next.

wheretologgeneric

Step 6 – On the Where To Log The Activity page, select where to send the activity events:

  • Log file – Sends to a TSV or JSON file
  • Syslog Server – Sends to a configured SIEM system
  • Netwrix Threat Manager (StealthDEFEND) – Sends to Netwrix Threat Manager

fileoutputpage

Step 7 – If Log Files is selected on the Where To Log The Activity page, the File Output page can be configured. The configurable options are:

  • Specify output file path – Specify the file path where log files are saved. Click the ellipses button (...) to open the Windows Explorer to navigate to a folder destination. Click Test to test if the path works.

  • Period to keep Log files – Log files will be deleted after the period entered number of days entered. The default is 10 days. Use the dropdown to specify whether to keep the Log files for a set amount of Minutes, Hours, or Days.

  • This log file is for Netwrix Access Analyzer (formerly Enterprise Auditor) (StealthAUDIT) – Enable this option to have Netwrix Access Analyzer (formerly Enterprise Auditor) collect this monitored host configuration

    RECOMMENDED: Identify the configuration to be read by Netwrix Access Analyzer (formerly Enterprise Auditor) when integration is available.

    • While the Activity Monitor can have multiple configurations per host, Netwrix Access Analyzer (formerly Enterprise Auditor) can only read one of them.

Click Next.

syslogoutputpage

Step 8 – If Syslog Server is selected on the Where To Log The Activity page, the Syslog Output page can be configured. The configurable options are:

  • Syslog server in SERVER[:PORT] format – Type the Syslog server name with a SERVER:Port format in the textbox.

    • The server name can be short name, fully qualified name (FQDN), or IP Address, as long as the organization’s environment can resolve the name format used. The Event stream is the activity being monitored according to this configuration for the monitored host.
  • Syslog Protocol – Identify the Syslog protocol to be used for the Event stream. The drop-down menu includes:

    • UDP
    • TCP
    • TLS

    The TCP and TLS protocols add the Message framing drop-down menu. See the Syslog Tab topic for additional information.

  • The Test button sends a test message to the Syslog server to check the connection. A green check mark or red will determine whether the test message has been sent or failed to send. Messages vary by Syslog protocol:

    • UDP – Sends a test message and does not verify connection
    • TCP/TLS – Sends test message and verifies connection
    • TLS – Shows error if TLS handshake fails

    See the Syslog Tab topic for additional information.

Click Finish.

Azure Active Directory in Activity Monitor

The added Microsoft Entra ID host is displayed in the monitored hosts table. Once a host has been added for monitoring, configure the desired ouptuts. See the Output for Monitored Hosts topic for additional information.

Host Properties for Microsoft Entra ID

Configuration settings can be edited through the tabs in the host’s Properties window. The configurable host properties are:

See the Host Properties Window topic for additional information.