Azure Activity Logs
Overview
Azure Activity Logs deliver a subscription-level audit trail of control-plane events—resource creations, modifications, deletions and service health incidents.
Warning
Important note - This format is currently in beta. We highly value your feedback to improve its performance.
- Supported environment: SaaS
- Detection based on: Telemetry, Alerts, Audit
- Supported application or feature:
- Administrative events
- Alerts
- Security events
- Policy events
Configure
Create an Azure application
- On the Azure Portal, in the search bar, go to
App registrations - Click
+ New registration - Type a name
- Select
Accounts in this organizational directory onlyoption as account type - Click
Register - From the
Overviewpage, copyApplication (client) IDandDirectory (tenant) ID
Create a client secret
- Go to
Manage>Certificates & secrets - Click
+ New client secret - Type a description and select the desired expiration period
- Click
Add - Copy the
Valueof the client secret
Add role to the APP
- In the search bar, go to
Subscriptions - Click on one of your subscriptions
- On the right panel, Click
Access control (IAM) - Click
+ Add>Add role assignment - In the
job function rolessub-tab, search forLog Analytics Readerand select it - Click
Next - Select
User, group or service principalas access - Click
+ Select members - Type the name of the Azure application created previously, select it and click
Select - Click
Review + assign
Retrieve your Subscription ID
You also need your Subscription ID if you don't have a default one.
In Azure Web Portal:
- Navigate to:
Home>Cost Management + Billing>Subscriptions - From there, copy the relevant Subscription ID that will be used in the command line (e.g.
uuid)
Create an intake
- Go to the intake page and create a new intake from the format Azure Activity Logs.
- Set up the intake configuration with the Subscription ID, Tenant ID, Client ID and Client Secret.
Detection section
The following section provides information for those who wish to learn more about the detection capabilities enabled by collecting this intake. It includes details about the built-in rule catalog, event categories, and ECS fields extracted from raw events. This is essential for users aiming to create custom detection rules, perform hunting activities, or pivot in the events page.