กิจกรรม
9 เม.ย. 15 - 10 เม.ย. 12
JDConf 2025 เขียนโค้ดอนาคตด้วย AI และเชื่อมต่อกับ Java peers และผู้เชี่ยวชาญที่ JDConf 2025
ลงทะเบียนทันทีเบราว์เซอร์นี้ไม่ได้รับการสนับสนุนอีกต่อไป
อัปเกรดเป็น Microsoft Edge เพื่อใช้ประโยชน์จากคุณลักษณะล่าสุด เช่น การอัปเดตความปลอดภัยและการสนับสนุนด้านเทคนิค
This article describes the information contained in the Microsoft Entra activity logs and how that schema is used by other services. This article covers the schemas from the Microsoft Entra admin center and Microsoft Graph. Descriptions of some key fields are provided.
hidden
for some properties if you don't have the required license.Microsoft Entra monitoring and health offer logs, reports, and monitoring tools that can be integrated with Azure Monitor, Microsoft Sentinel, and other services. These services need to map the properties of the logs to their service's configurations. The schema is the map of the properties, the possible values, and how they're used by the service. Understanding the log schema is helpful for effective troubleshooting and data interpretation.
Microsoft Graph is the primary way to access Microsoft Entra logs programmatically. The response for a Microsoft Graph call is in JSON format and includes the properties and values of the log. The schema of the logs is defined in the Microsoft Graph documentation.
There are two endpoints for the Microsoft Graph API. The V1.0 endpoint is the most stable and is commonly used for production environments. The beta version often contains more properties, but they're subject to change. For this reason, we don't recommend using the beta version of the schema in production environments.
Microsoft Entra customer can configure activity log streams to be sent to Azure Monitor storage accounts. This integration enables Security Information and Event Management (SIEM) connectivity, long-term storage, and improved querying capabilities with Log Analytics. The log schemas for Azure Monitor might differ from the Microsoft Graph schemas.
For full details on these schemas, see the following articles:
When looking up the definitions of a value, pay attention to the version you're using. There might be differences between the V1.0 and beta versions of the schema.
Some values are common across all log schemas.
correlationId
: This unique ID helps correlate activities that span across various services and is used for troubleshooting. This value's presence in multiple logs doesn't indicate the ability to join logs across services.status
or result
: This important value indicates the result of the activity. Possible values are: success
, failure
, timeout
, unknownFutureValue
.hidden
is returned.activityDisplayName
: Indicates the activity name or the operation name (examples: "Create User" and "Add member to group"). For more information, see Audit log activities.category
: Indicates which resource category that's targeted by the activity. For example: UserManagement
, GroupManagement
, ApplicationManagement
, RoleManagement
. For more information, see Audit log activities.initiatedBy
: Indicates information about the user or app that initiated the activity.targetResources
: Provides information on which resource was changed. Possible values include User
, Device
, Directory
, App
, Role
, Group
, Policy
or Other
.resourceId
: The resource that the user signed into.resourceTenantId
: The tenant that owns the resource being accessed. Might be the same as the homeTenantId
.homeTenantId
: The tenant that owns the user account that is signing in.riskState
: Reports status of the risky user, sign-in, or a risk event.riskDetail
: Provides the reason behind a specific state of a risky user, sign-in, or risk detection. The value none
means that no action has been performed on the user or sign-in so far.riskEventTypes_v2
: Risk detection types associated with the sign-in.riskLevelAggregated
: Aggregated risk level. The value hidden
means the user or sign-in wasn't enabled for Microsoft Entra ID Protection.crossTenantAccessType
: Describes the type of cross-tenant access used to access the resource. For example, B2B, Microsoft Support, and passthrough sign-ins are captured here.status
: The sign-in status that includes the error code and description of the error (if a sign-in failure occurs).The appliedConditionalAccessPolicies
subsection lists the Conditional Access policies related to that sign-in event. The section is called applied Conditional Access policies; however, policies that were not applied also appear in this section. A separate entry is created for each policy. For more information, see conditionalAccessPolicy resource type.
กิจกรรม
9 เม.ย. 15 - 10 เม.ย. 12
JDConf 2025 เขียนโค้ดอนาคตด้วย AI และเชื่อมต่อกับ Java peers และผู้เชี่ยวชาญที่ JDConf 2025
ลงทะเบียนทันทีการฝึกอบรม
โมดูล
Monitor and maintain Microsoft Entra ID - Training
Audit and diagnostic logs within Microsoft Entra ID provide a rich view into how users are accessing your Azure solution. Learn to monitor, troubleshoot, and analyze sign-in data.
ใบรับรอง
รับรองโดย Microsoft: การเชื่อมโยงผู้ดูแลระบบข้อมูลประจําตัวและการเข้าถึง - Certifications
แสดงให้เห็นถึงคุณลักษณะของ Microsoft Entra ID เพื่อปรับโซลูชันข้อมูลประจําตัวให้ทันสมัย ใช้โซลูชันแบบไฮบริด และใช้การกํากับดูแลข้อมูลประจําตัว