Skip to content

Commit 16548b0

Browse files
committed
Various updates to Entra reporting
1 parent f40e0fa commit 16548b0

7 files changed

+36
-13
lines changed

api-reference/beta/resources/appcredentialsigninactivity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.localizationpriority: medium
55
author: "madansr7"
66
ms.subservice: "reports"
77
doc_type: "resourcePageType"
8-
toc.title: App credential sign-in activity
8+
toc.title: Application credential sign-in activity (preview)
99
ms.date: 07/30/2024
1010
---
1111

api-reference/beta/resources/applicationsignindetailedsummary.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@ author: "sureshja"
66
ms.subservice: "entra-monitoring-health"
77
doc_type: resourcePageType
88
ms.date: 07/22/2024
9+
toc.title: Application sign-in detailed summary (preview)
910
---
1011

1112
# applicationSignInDetailedSummary resource type

api-reference/beta/resources/applicationsigninsummary.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@ author: "egreenberg14"
66
ms.subservice: "entra-monitoring-health"
77
doc_type: "resourcePageType"
88
ms.date: 07/22/2024
9+
toc.title: Application sign-in summary (preview)
910
---
1011

1112
# applicationSignInSummary resource type

api-reference/beta/resources/customsecurityattributeaudit.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@ ms.localizationpriority: medium
66
ms.subservice: "entra-monitoring-health"
77
doc_type: resourcePageType
88
ms.date: 07/22/2024
9+
toc.title: Custom security attribute audit (preview)
910
---
1011

1112
# customSecurityAttributeAudit resource type

api-reference/beta/resources/report-identity-access.md

Lines changed: 14 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -7,14 +7,14 @@ author: faithombongi
77
ms.author: ombongifaith
88
ms.reviewer: egreenberg
99
doc_type: conceptualPageType
10-
ms.date: 12/30/2024
10+
ms.date: 01/07/2025
1111
---
1212

1313
# Identity and access reports API overview
1414

1515
[!INCLUDE [beta-disclaimer](../../includes/beta-disclaimer.md)]
1616

17-
With Microsoft Graph, you can programmatically accesss identity and access reports to monitor and troubleshoot all activities in your tenant. In addition, you can analyze these logs with Azure Monitor logs and Log Analytics, or stream to third-party SIEM tools for further investigations.
17+
With Microsoft Graph, you can programmatically access identity and access reports to monitor and troubleshoot all activities in your tenant. In addition, you can analyze these logs with Azure Monitor logs and Log Analytics, or stream to third-party SIEM tools for further investigations.
1818

1919
The availability of all Microsoft Entra identity and access reports is governed by the [Microsoft Entra data retention policies](/entra/identity/monitoring-health/reference-reports-data-retention#how-long-does-azure-ad-store-the-data).
2020

@@ -26,15 +26,15 @@ The availability of all Microsoft Entra identity and access reports is governed
2626

2727
The AD FS application activity report provides information about how a relying party is configured with Active Directory Federation Services (AD FS), its aggregated usage, and whether the relying party configuration can be migrated to Microsoft Entra ID. For more information, see the [relyingPartyDetailedSummary](/graph/api/resources/applicationsigninsummary) resource.
2828

29-
#### Application credential activity (preview)
29+
#### Application credential sign-in activity (preview)
3030

3131
This report is available through the [appCredentialSignInActivity resource type](/graph/api/resources/appcredentialsigninactivity) and details the usage of an app credential (secret, certificate, or federated identity credential) in your tenant.
3232

33-
#### Service principal sign in activity (preview)
33+
#### Service principal sign-in activity (preview)
3434

3535
This report is available through the [servicePrincipalSignInActivity resource type](/graph/api/resources/serviceprincipalsigninactivity) and details the sign-in activity for a service principal in your tenant. The sign-in activity can be delegated or application-only scenarios. For application-only scenarios, the [application credential activity](#application-credential-activity-preview) provides additional information on the credential usage.
3636

37-
#### Application sign-in
37+
#### Application sign-in (preview)
3838

3939
Evaluate the usage of application sign-ins in your tenant using either [a summary report](../resources/applicationsigninsummary.md) or [a report that provides details of sign-ins](../resources/applicationsignindetailedsummary.md), such as the number of sign-ins and whether any errors occurred during sign-in.
4040

@@ -44,21 +44,25 @@ In Microsoft Entra External ID for external tenants where you have registered ap
4444

4545
### Health reports (preview)
4646

47-
- Monitor [Microsoft Entra availability and SLA compliance](../api/azureadauthentication-get.md). This report is available on the Microsoft Entra portal through **Monitoring and health** tab group > **Health** > **SLA attainment**
47+
- Monitor [Microsoft Entra availability and SLA compliance](../api/azureadauthentication-get.md). This report is available on the Microsoft Entra admin center through **Monitoring and health** tab group > **Health** > **SLA attainment**
4848
- Monitor the health of various Microsoft Entra and Microsoft 365 services through the [serviceActivity resource type](../resources/serviceactivity.md) and its associated API operations. For example:
49-
- Success and failure metrics for important events within your tenant such as MFA sign-in success and failure metrics, and Conditional Access sign-in metrics for managed and compliant devices. These reports are available on the Microsoft Entra portal through **Monitoring and health** tab group > **Health** > **Scenario Monitoring**
49+
- Success and failure metrics for important events within your tenant such as MFA sign-in success and failure metrics, and Conditional Access sign-in metrics for managed and compliant devices. These reports are available on the Microsoft Entra admin center through **Monitoring and health** tab group > **Health** > **Scenario Monitoring**
5050
- Health status for Microsoft 365 services including Exchange Online, Teams, and different Microsoft 365 apps like Word, PowerPoint, Visio, and Excel
5151
- Retrieve signals for different alerts relating to Microsoft Entra services with [Microsoft Entra Health monitoring APIs](../resources/healthmonitoring-overview.md)
5252

53-
### Registration and usage
53+
### Authentication methods registration and usage
5454

55-
Authentication methods activity reports provides information on the registration and usage of [authentication methods](../resources/authenticationmethods-overview.md) in your tenant. For example, how many users are registered for an authentication method, how any are capable for MFA or SSPR, and so on. You can determine which authentication methods are more successful for your organization, what types of errors end users are running into, and what campaign you need to run to help your end users adopt the use of SSPR and MFA.
55+
Authentication methods activity reports provide information on the registration and usage of [authentication methods](../resources/authenticationmethods-overview.md) in your tenant. For example, how many users are registered for an authentication method, how any are capable for MFA or SSPR, and so on. You can determine which authentication methods are more successful for your organization, what types of errors end users are running into, and what campaign you need to run to help your end users adopt the use of SSPR and MFA.
5656

5757
For more information, see [authentication method usage APIs](../resources/authenticationmethods-usage-insights-overview.md).
5858

5959
### Microsoft Entra audit logs
6060

61-
Audit logs are available for sign-ins, activities in the directory, and provisioning. For more information, see [Microsoft Entra audit logs](../resources/azure-ad-auditlog-overview.md).
61+
Audit logs are available for sign-ins, activities in the directory including those relating to custom security attributes, and provisioning. For more information, see [Microsoft Entra audit logs](../resources/azure-ad-auditlog-overview.md).
62+
63+
### Microsoft Entra recommendations (preview)
64+
65+
Microsoft Entra recommendations are insights into your tenant state that fall into two categories: best practice recommendations or the Identity Secure Score. Best practice recommendations include detected usage of deprecated or retired features, MFA recommendations, and inactive guests. For more information, see [Microsoft Entra recommendations APIs](../resources/recommendations-api-overview.md)
6266

6367
## Related content
6468

api-reference/beta/resources/serviceprincipalsigninactivity.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@ author: "madansr7"
66
ms.subservice: "reports"
77
doc_type: "resourcePageType"
88
ms.date: 07/30/2024
9+
toc.title: Service principal sign-in activity (preview)
910
---
1011

1112
# servicePrincipalSignInActivity resource type

api-reference/v1.0/resources/report-identity-access.md

Lines changed: 17 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.date: 12/30/2024
1414

1515
[!INCLUDE [beta-disclaimer](../../includes/beta-disclaimer.md)]
1616

17-
With Microsoft Graph, you can programmatically accesss identity and access reports to monitor and troubleshoot all activities in your tenant. In addition, you can analyze these logs with Azure Monitor logs and Log Analytics, or stream to third-party SIEM tools for further investigations.
17+
With Microsoft Graph, you can programmatically access identity and access reports to monitor and troubleshoot all activities in your tenant. In addition, you can analyze these logs with Azure Monitor logs and Log Analytics, or stream to third-party SIEM tools for further investigations.
1818

1919
The availability of all Microsoft Entra identity and access reports is governed by the [Microsoft Entra data retention policies](/entra/identity/monitoring-health/reference-reports-data-retention#how-long-does-azure-ad-store-the-data).
2020

@@ -28,14 +28,29 @@ The AD FS application activity report provides information about how a relying p
2828

2929
#### Authentication methods registration and usage activity
3030

31-
Authentication methods activity reports provides information on the registration and usage of [authentication methods](../resources/authenticationmethods-overview.md) in your tenant. For example, how many users are registered for an authentication method, how any are capable for MFA or SSPR, and so on. You can determine which authentication methods are more successful for your organization, what types of errors end users are running into, and what campaign you need to run to help your end users adopt the use of SSPR and MFA.
31+
Authentication methods activity reports provide information on the registration and usage of [authentication methods](../resources/authenticationmethods-overview.md) in your tenant. For example, how many users are registered for an authentication method, how any are capable for MFA or SSPR, and so on. You can determine which authentication methods are more successful for your organization, what types of errors end users are running into, and what campaign you need to run to help your end users adopt the use of SSPR and MFA.
3232

3333
For more information, see [authentication method usage APIs](../resources/authenticationmethods-usage-insights-overview.md).
3434

3535
### Microsoft Entra audit logs
3636

3737
Audit logs are available for sign-ins, activities in the directory, and provisioning. For more information, see [Microsoft Entra audit logs](../resources/azure-ad-auditlog-overview.md).
3838

39+
## Reports in preview only
40+
41+
The following reports are available on the `beta` endpoint only:
42+
43+
- [Application credential sign-in activity](/graph/api/resources/appcredentialsigninactivity?view=graph-rest-beta&preserve-view=true)
44+
- [Service principal sign-in activity](/graph/api/resources/serviceprincipalsigninactivity?view=graph-rest-beta&preserve-view=true)
45+
- Application sign-in reports: [summarized count](/graph/api/resources/applicationsigninsummary?view=graph-rest-beta&preserve-view=true) or [detailed report](/graph/api/applicationsignindetailedsummary?view=graph-rest-beta&preserve-view=true)
46+
- Application user activity for Microsoft Entra External ID: [daily insights](/graph/api/resources/dailyuserinsightmetricsroot?view=graph-rest-beta&preserve-view=true) and [monthly insights](/graph/api/resources/monthlyuserinsightmetricsroot?view=graph-rest-beta&preserve-view=true)
47+
- Health reports: [SLA attainment](/graph/api/azureadauthentication-get?view=graph-rest-beta&preserve-view=true), [service activity](/graph/api/resources/serviceactivity?view=graph-rest-beta&preserve-view=true), and [health monitoring](/graph/api/resources/healthmonitoring-overview?view=graph-rest-beta&preserve-view=true)
48+
- The following authentication methods registration and usage reports
49+
- [Credential usage summary](/graph/api/resources/credentialusagesummary?view=graph-rest-beta&preserve-view=true)
50+
- [Credential user registration count](/graph/api/resources/credentialuserregistrationcount?view=graph-rest-beta&preserve-view=true)
51+
- [User credential usage details](/graph/api/resources/usercredentialusagedetails?view=graph-rest-beta&preserve-view=true)
52+
- [Microsoft Entra recommendations](/graph/api/resources/recommendations-api-overview?view=graph-rest-beta&preserve-view=true)
53+
3954
## Related content
4055

4156
- For more information about these reports, see [Microsoft Entra monitoring and health](/entra/identity/monitoring-health)

0 commit comments

Comments
 (0)