|
| 1 | +# How to use workbooks with Global Secure Access |
| 2 | + |
| 3 | +Workbooks combine text, log queries, metrics, and parameters into rich interactive reports. Any team member with access to the required Azure resources can create and edit workbooks. To learn more about Azure Workbooks, see [Overview of Azure Workbooks](https://learn.microsoft.com/en-us/azure/azure-monitor/visualize/workbooks-overview). |
| 4 | + |
| 5 | +## Prerequisites |
| 6 | +- Administrators who interact with **Global Secure Access** features must have one or more of the following role assignments depending on the tasks they're performing. |
| 7 | + - The [Global Secure Access Administrator role](https://learn.microsoft.com/en-us/entra/identity/role-based-access-control/permissions-reference) role to manage the Global Secure Access features. |
| 8 | + - The [Security Administrator](https://learn.microsoft.com/en-us/entra/identity/role-based-access-control/permissions-reference#security-administrator) to create, edit, and use workbooks. |
| 9 | +- An existing Log Analytics workspace. To learn more about Log Analytics, see [Overview of Log Analytics in Azure Monitor](https://learn.microsoft.com/en-us/azure/azure-monitor/logs/log-analytics-overview). |
| 10 | +- The product requires licensing. For details, see the licensing section of [What is Global Secure Access](https://learn.microsoft.com/en-us/entra/global-secure-access/overview-what-is-global-secure-access). If needed, you can [purchase licenses or get trial licenses](https://aka.ms/azureadlicense). |
| 11 | + |
| 12 | + |
| 13 | +## Export Global Secure Access information to Log Analytics |
| 14 | + |
| 15 | +Global Secure Access workbooks integrate with Log Analytics. This integration allows you to monitor and analyze logs effectively. To learn more about Global Secure Access log integration with Log Analytics, see [Integrate Microsoft Entra logs with Azure Monitor logs](https://learn.microsoft.com/en-us/entra/identity/monitoring-health/howto-integrate-activity-logs-with-azure-monitor-logs). |
| 16 | + |
| 17 | +To learn how to send log information to Log Analytics, see [Send logs to Azure Monitor](https://learn.microsoft.com/en-us/entra/identity/monitoring-health/howto-integrate-activity-logs-with-azure-monitor-logs#send-logs-to-azure-monitor). |
| 18 | + |
| 19 | +The Global Secure Access categories are: |
| 20 | + |
| 21 | +|Log type |Diagnostic settings category | |
| 22 | +|----------|-----------| |
| 23 | +|Traffic logs |`NetworkAccessTrafficLogs` | |
| 24 | +|Audit logs (Preview) | `AuditLogs` | |
| 25 | +|Enriched Microsoft 365 logs (Preview) |`EnrichedOffice365AuditLogs` | |
| 26 | +|Remote Network Health Logs (Preview) |`RemoteNetworkHealthLogs` | |
| 27 | + |
| 28 | + |
| 29 | + |
| 30 | +## Global Secure Access workbooks |
| 31 | + |
| 32 | +In the Microsoft Entra admin center, navigate to **Global Secure Access** > **Monitor** > **Workbooks** to view predefined workbooks. Note that you won't see the workbooks unless logging data has been captured. |
| 33 | + |
| 34 | +**Network Traffic Insights workbook** - |
| 35 | +Provides an overview of all traffic logs within your network, offering insights into data transfer, anomalies, and potential threats. |
| 36 | + |
| 37 | + |
| 38 | + |
| 39 | +**Remote Network Health workbook** - |
| 40 | +Monitors the health and performance of remote networks, ensuring that all remote connections are reliable and secure. |
| 41 | + |
| 42 | + |
| 43 | + |
| 44 | +**Clients Activity and Status workbook** - |
| 45 | +Offers an overview of the clients connected to your network, including their health status and activity levels. |
| 46 | + |
| 47 | + |
| 48 | + |
| 49 | +**Discovered Application Segments workbook** - |
| 50 | +Identifies and categorizes application segments discovered within your network, aiding in effective monitoring and management of applications. |
| 51 | + |
| 52 | + |
| 53 | + |
| 54 | +**Enriched Microsoft 365 Logs workbook** - |
| 55 | +Provides a detailed view of Microsoft 365 log data, enriched with contextual information to enhance visibility into user activities and potential security threats. |
| 56 | + |
| 57 | + |
0 commit comments