Skip to content

Commit b5251dd

Browse files
2 parents ed72514 + 3f19e0c commit b5251dd

File tree

8 files changed

+100
-0
lines changed

8 files changed

+100
-0
lines changed
Lines changed: 43 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,43 @@
1+
# GSA logs and monitoring
2+
3+
This article describes the logs and dashboards that are available to you and some common monitoring scenarios.
4+
5+
## Dashboard
6+
7+
The Global Secure Access dashboard provides you with visualizations of the traffic flowing through the Microsoft Entra Private Access and Microsoft Entra Internet Access services, which include Microsoft traffic and Private Access traffic. The dashboard provides a summary of the data related to product deployment and insights. Within these categories you can see the number of users, devices, and applications seen in the last 24 hours. You can also see device activity and cross-tenant access.
8+
9+
For more information, see [Global Secure Access dashboard](https://learn.microsoft.com/en-us/entra/global-secure-access/concept-traffic-dashboard).
10+
11+
## Audit logs (preview)
12+
13+
The Microsoft Entra audit log is a valuable source of information when researching or troubleshooting changes to your Microsoft Entra environment. Changes related to Global Secure Access are captured in the audit logs in several categories, such as filtering policy, forwarding profiles, remote network management, and more.
14+
15+
For more information, see [Global Secure Access audit logs (preview)](https://learn.microsoft.com/en-us/entra/global-secure-access/how-to-access-audit-logs).
16+
17+
## Traffic logs (preview)
18+
19+
The Global Secure Access traffic logs provide a summary of the network connections and transactions that are occurring in your environment. These logs look at *who* accessed *what* traffic from *where* to *where* and with what *result*. The traffic logs provide a snapshot of all connections in your environment and breaks that down into traffic that applies to your traffic forwarding profiles. The logs details provide the traffic type destination, source IP, and more.
20+
21+
For more information, see [Global Secure Access traffic logs (preview)](https://learn.microsoft.com/en-us/entra/global-secure-access/how-to-view-traffic-logs).
22+
23+
## Enriched Office 365 logs (preview)
24+
25+
The *Enriched Office 365 logs* provide you with the information you need to gain insights into the performance, experience, and availability of the Microsoft 365 apps your organization uses. You can integrate the logs with a Log Analytics workspace or third-party SIEM tool for further analysis.
26+
27+
Customers use existing *Office Audit logs* for monitoring, detection, investigation, and analytics. We understand the importance of these logs and have partnered with Microsoft 365 to include SharePoint logs. These enriched logs include details like client information and original public IP details that can be used for troubleshooting security scenarios.
28+
29+
For more information, see [Enriched Office 365 logs](https://learn.microsoft.com/en-us/entra/global-secure-access/how-to-view-enriched-logs).
30+
31+
## Log Retention and Storage
32+
33+
**Traffic Logs and Remote Network Health Logs:** These logs are retained within the system for 30 days. This duration allows for ample time to review and analyze recent activities and network health status.
34+
35+
**Audit Logs:** The retention period for Audit Logs varies depending on your Microsoft Entra ID license. The table provides a breakdown:
36+
37+
|Report Type | Microsoft Entra ID Free | Microsoft Entra ID P1 | Microsoft Entra ID P2 |
38+
|----------|-----------|------------|------------|
39+
|Audit Logs | Seven days | 30 days | 30 days |
40+
41+
**Office Logs:** Office Logs are maintained for a shorter duration, up to only 24 hours.
42+
43+
**Exporting and Storing Logs for Longer Durations:** As a customer, you have the flexibility to export these logs through the diagnostic settings feature. Exporting logs allows you to maintain records for more extended periods beyond the default retention times. This can be crucial for compliance, auditing, and in-depth analysis purposes.
Lines changed: 57 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,57 @@
1+
# How to use workbooks with Global Secure Access
2+
3+
Workbooks combine text, log queries, metrics, and parameters into rich interactive reports. Any team member with access to the required Azure resources can create and edit workbooks. To learn more about Azure Workbooks, see [Overview of Azure Workbooks](https://learn.microsoft.com/en-us/azure/azure-monitor/visualize/workbooks-overview).
4+
5+
## Prerequisites
6+
- Administrators who interact with **Global Secure Access** features must have one or more of the following role assignments depending on the tasks they're performing.
7+
- The [Global Secure Access Administrator role](https://learn.microsoft.com/en-us/entra/identity/role-based-access-control/permissions-reference) role to manage the Global Secure Access features.
8+
- The [Security Administrator](https://learn.microsoft.com/en-us/entra/identity/role-based-access-control/permissions-reference#security-administrator) to create, edit, and use workbooks.
9+
- An existing Log Analytics workspace. To learn more about Log Analytics, see [Overview of Log Analytics in Azure Monitor](https://learn.microsoft.com/en-us/azure/azure-monitor/logs/log-analytics-overview).
10+
- The product requires licensing. For details, see the licensing section of [What is Global Secure Access](https://learn.microsoft.com/en-us/entra/global-secure-access/overview-what-is-global-secure-access). If needed, you can [purchase licenses or get trial licenses](https://aka.ms/azureadlicense).
11+
12+
13+
## Export Global Secure Access information to Log Analytics
14+
15+
Global Secure Access workbooks integrate with Log Analytics. This integration allows you to monitor and analyze logs effectively. To learn more about Global Secure Access log integration with Log Analytics, see [Integrate Microsoft Entra logs with Azure Monitor logs](https://learn.microsoft.com/en-us/entra/identity/monitoring-health/howto-integrate-activity-logs-with-azure-monitor-logs).
16+
17+
To learn how to send log information to Log Analytics, see [Send logs to Azure Monitor](https://learn.microsoft.com/en-us/entra/identity/monitoring-health/howto-integrate-activity-logs-with-azure-monitor-logs#send-logs-to-azure-monitor).
18+
19+
The Global Secure Access categories are:
20+
21+
|Log type |Diagnostic settings category |
22+
|----------|-----------|
23+
|Traffic logs |`NetworkAccessTrafficLogs` |
24+
|Audit logs (Preview) | `AuditLogs` |
25+
|Enriched Microsoft 365 logs (Preview) |`EnrichedOffice365AuditLogs` |
26+
|Remote Network Health Logs (Preview) |`RemoteNetworkHealthLogs` |
27+
28+
![alt text](./img/add-diagnostic-setting.png)
29+
30+
## Global Secure Access workbooks
31+
32+
In the Microsoft Entra admin center, navigate to **Global Secure Access** > **Monitor** > **Workbooks** to view predefined workbooks. Note that you won't see the workbooks unless logging data has been captured.
33+
34+
**Network Traffic Insights workbook** -
35+
Provides an overview of all traffic logs within your network, offering insights into data transfer, anomalies, and potential threats.
36+
37+
![alt text](./img/Network-Traffic-Insights.png)
38+
39+
**Remote Network Health workbook** -
40+
Monitors the health and performance of remote networks, ensuring that all remote connections are reliable and secure.
41+
42+
![alt text](./img/Remote-Network-Health.png)
43+
44+
**Clients Activity and Status workbook** -
45+
Offers an overview of the clients connected to your network, including their health status and activity levels.
46+
47+
![alt text](./img/Client-Activity.png)
48+
49+
**Discovered Application Segments workbook** -
50+
Identifies and categorizes application segments discovered within your network, aiding in effective monitoring and management of applications.
51+
52+
![alt text](./img/App-Discovery.png)
53+
54+
**Enriched Microsoft 365 Logs workbook** -
55+
Provides a detailed view of Microsoft 365 log data, enriched with contextual information to enhance visibility into user activities and potential security threats.
56+
57+
![alt text](./img/Enriched-Logs.png)
67.8 KB
Loading
78.6 KB
Loading
98.9 KB
Loading
36.5 KB
Loading
40.4 KB
Loading
118 KB
Loading

0 commit comments

Comments
 (0)