Azure App registration key expiry details - azure

Does the Azure Audit logs will have any details pertaining to the App registration key expiry. Because, I already have the Azure audit logs ingested to Splunk and i am trying to build a rule in Splunk to capture that specific entry to alert us if the app registration key is about to expire in advance.
Thanks,

Related

My applications are deployed in Azure Webapps now I would like to capture logon user name, logon access timestamps, Duration, Failed logons

My applications are deployed in Azure Webapps now I would like to capture below details-
Logon user name, logon access timestamps, Duration, Failed logons...
Tried- I have enabled Application Insights in Azure but still I could not able to see those details
What should be the best approach without redeploying the application.
Is there any options in azure portal blade where I can collect ?
Inside- Usages Blade I saw the Users but I can see only user Id not user name.

Azure B2C event logging - Is it possible to log when customer sign-outs the same way as it's possible to see sing-ins in the Azure Portal?

Is it possible with some custom configuration to be able to see customer sign-outs with date and time the same way it is possible to see sign-ins in OOB Azure B2C solution in Azure Portal?
I would be greatly appreciate for any hints how to achieve this as there is very little or none articles on the internet touching this matter.
There is no custom configuration available to see the sign-out logs in azure portal. as you mentioned we can see sign-in logs and audit logs.
You can find more information here about azure AD logs.

Searching Azure Log Analytics SigninLogs shows no data

Within the Azure Logs Configure signal logic blade, I'm trying to create an email alert whenever a particular user logs into Azure.
Following Microsoft's documentation, the following logic should return the recent logins, but it is showing nothing despite that user definitely logging in multiple times today:
SigninLogs
| project UserId
| where UserId == "f1cd9e01-[removed]-c9cd45e984da"
The UserId value being used is the Object Id from their respective Azure AD user page, so it's definitely correct.
If I remove the | where clause entirely then still no data is returned.
Can anybody suggest any reason why this wouldn't show any data?
If you want to query Azure AD sign-in logs in Azure Log Analytics, we should send the logs to Azure Log Analytics at first. For more details, please refer to here and here.
Besides, please note that if you want to send Azure AD sign-in logs to Azure Log Analytics, you should have Azure AD Premium P1 or P2 license.
for example
Sign in to the Azure portal.
Select Azure Active Directory > Diagnostic settings -> Add diagnostic setting. You can also select Export Settings from the Audit Logs or Sign-ins page to get to the diagnostic settings configuration page.
In the Diagnostic settings menu, select the Send to Log Analytics workspace check box, and then select Configure.
Select the Log Analytics workspace you want to send the logs to, or create a new workspace in the provided dialog box.
Do either or both of the following:
To send audit logs to the Log Analytics workspace, select the AuditLogs check box.
To send sign-in logs to the Log Analytics workspace, select the SignInLogs check box.

Logging for Azure graphapi

In my current environment in azure we are using azure graphapi mostly, for that we want to know who is doing what like logging of each request, when ever any request via graph api is there is option to see what data they access in azure portal?
Or logs for service principle also when ever any one logs in using service principle we wanted to know what actions they are doing.
I think the log reports in the portal currently could not fully meet your requirements.
Navigate to the Azure Active Directory in the portal -> Enterprise applications -> find the service principal you want -> in Sign-ins, you could check the login information.
In this blade, you can just get the login information, the Resource is Microsoft Graph, but you could not know what actions they are doing via Microsoft Graph.
To check what actions the users are doing in the AAD tenant, navigate to the Azure Active Directory -> Audit logs, you can check the users' actions, but you could not know if they did these things via Microsoft Graph/AAD Graph or not.
For more details, see Sign-in logs and Audit logs.

Azure Budget creation from an Azure AD application context

While trying to create azure budgets via Powreshell API ( New-AzureRmConsumptionBudget ).
When this is ran from Azure User context budget is created and alerts are coming. When ran from the context of a Azure AD Application budget is getting created but no alerts are coming.
Upon digging a bit I could see that there is an email address is mentioned at budget alert email. This email address intend is to contact to unsubscribe from alerts.
I'm not sure if that is the reason alerts are not coming.
Can some one help to clarify this
As per Azure blog
Calls to the budgets API enforce a user context. Due to this budgets won't be working as expected when created via powershell from an Azure AD application context.

Resources