Microsoft Entra ID is a cloud-hosted identity and access management service that enables users to access external resources. This integration allows you to forward your Microsoft Entra ID audit and sign-in logs to Datadog.
This integration forwards logs to Datadog using Azure with Event Hubs. Configure Entra ID to forward activity logs to the event hub.
-
Set up the log forwarding pipeline from Azure to Datadog using Event Hubs by following the Send Azure Logs to Datadog guide.
-
In Azure portal, select Microsoft Entra ID > Monitoring > Audit logs.
-
Select Export Data Settings.
-
In the Diagnostics settings pane, do one of the following:
- To change existing settings, select Edit setting.
- To add new settings, select Add diagnostics setting. You can have up to three settings.
-
Select the Stream to an event hub check box.
-
Select the Azure subscription and Event Hubs namespace that you created earlier to route the logs to.
-
Do one or both of the following. Datadog recommends selecting both.
- To send audit logs, select the AuditLogs check box.
- To send sign-in logs, select the SignInLogs check box.
-
Select Save.
Logs should start coming into Datadog within 15 minutes. For more details on the setup, see the Azure tutorial.
This integration allows you to setup log ingestion for Microsoft Entra ID activity logs.
This includes the following:
-
Sign-ins - Provides information about the usage of managed applications and user sign-in activities.
-
Audit logs - Provides traceability through logs for all changes done by various features within Azure AD.
Microsoft Entra ID does not include any metrics.
Datadog sends credential expiry events, which grant visibility into credential expirations for Azure app registrations, Key Vault keys, Key Vault secrets, and Key Vault certificates. The Microsoft Entra ID integration must be installed to receive events for Azure app registrations. Receiving events from Azure also requires installation of the Azure integration.
- Expiration events are sent 60, 30, 15, and 1 day(s) before credential expiration, and once after expiration.
- Missing permission events are sent every 15 days. A missing permission event lists the Key Vaults for which Datadog has not been given permissions. If no changes have been made regarding Key Vault permissions in the previous 15-day cycle, the event notification is not sent again.
You can view these events in Event Explorer.
Notes:
- To collect Azure app registration expiration events, enable access to the Microsoft Graph API.
- If a certificate and its associated key and secret expire at the exact same time, one expiration event is sent for all resources.
Need help? Contact Datadog support.