Where does the Azure Activity Logs API pull data from?
The Azure Activity Logs API pulls data from the Activity Log stored in the Azure Resource Manager (ARM) control plane.
How does Microsoft Sentinel collect or ingest Azure Activity log data?
Microsoft Sentinel collects or ingests Azure Activity log data using a native connector that pulls logs directly from your Azure subscription.When enabled, Sentinel sets up a diagnostic setting behind the scenes that routes the Activity logs to the Log Analytics workspace that Sentinel is connected to.
reference
https://learn.microsoft.com/en-us/azure/sentinel/connect-services-diagnostic-setting-based
Are there any filters, delays, or processing layers involved that might lead to differences?
Azure Activity Logs can take up to 5–15 minutes to appear in Microsoft Sentinel after an event occurs.
This delay is due to Azure’s internal processing and eventual delivery to the Log Analytics workspace. There is no transformation or data reduction applied by Sentinel — logs are ingested as-is
We have observed that the Azure Activity Logs API returns duplicate records. Does Microsoft Sentinel apply any mechanism, such as filtering or deduplication, when exporting or ingesting this data?
Microsoft Sentinel itself does not automatically deduplicate logs at ingestion. However, deduplication can be implemented at the query level using Kusto Query Language (KQL).
The discrepancy might be due to differences in ingestion, enrichment, and filtering. The Azure Activity Logs REST API gives raw control plane logs, while Sentinel ingests them via Azure Monitor, often with enrichment and possible delays or filtering.
reference:
https://learn.microsoft.com/en-us/azure/sentinel/audit-sentinel-data
Please let me know if you need any further assistance
Please do not forget to "Accept the answer” and “upvote it” wherever the information provided helps you, this can be beneficial to other community members.it would be greatly appreciated and helpful to others.