Microsoft Entra ID Audit Logs

Connecting Microsoft Entra ID Audit logs to your Panther Console

Overview

Panther supports ingesting Microsoft Entra ID (previously "Azure Active Directory") Audit logs via common Data Transport options, like Azure Event Hub and Blob Storage.

How to onboard Microsoft Entra ID Audit logs to Panther

You'll first create an Azure Blob Storage or Azure Event Hub source in Panther, then configure Azure to export logs to that location.

Step 1: Create the Microsoft Entra ID source in Panther

  1. In the lefthand navigation bar of your Panther Console, click Configure > Log Sources.

  2. Click Create New.

  3. Search for “Microsoft Entra ID Audit” then click its tile.

    • In the slide-out panel, the Transport Mechanism dropdown in the upper-right corner will be pre-populated with the Azure Event Hub option. Either leave this selection as-is, or select Azure Blob Storage.

  4. Click Start Setup.

  5. Follow Panther's instructions for configuring an Azure Event Hub or Azure Blob Storage Source.

Latency differs for these two options: If you select the Blob Storage option, Panther retrieves Entra ID files every hour. If you select Event Hub, the ingestion is near real-time.

Step 2: Export Microsoft Entra ID Audit logs

To export Microsoft Defender XDR logs to Event Hubs or a storage account, follow the instructions below:

  1. Sign in to your Azure dashboard.

  2. Navigate to the Microsoft Entra ID service.

  3. In the left-hand panel, click Audit logs.

  4. Near the top of the page, click Export Data Settings. The Microsoft Entra ID console is shown. An arrow is drawn from the "Audit logs" option in the navigation bar to a "Export data settings" button\

  5. Click Add Diagnostic Setting.

  6. On the Diagnostic setting page, set the following values:

    • Diagnostic setting name: Enter a descriptive name.

    • Categories (under Logs): Select the following checkboxes:

      • AuditLogs

      • SignInLogs

      • NonInteractiveUserSignInLogs

      • ServicePrincipalSignInLogs

      • ManagedIdentitySignInLogs

    • Destination details: Select either Archive to a storage account or Stream to an event hub, based the type of log source you created in Panther in Step 1.

      • If you select Archive to a storage account, in the Storage account field, select your storage account.

      • If you select Stream to an event hub, in the Event hub namespace field, select your event hub.

  7. In the upper left corner, click Save.

(Blog Storage transport only) Step 3: Assign a role to the container

  1. Click on your newly created container, then in the left-hand navigation bar, click Access Control (IAM).

  2. Click +Add. In the panthertestcontainer3 Access Control (IAM) page, an arrow is drawn to the +Add button

  3. Click Add Role Assignment.

  4. Search for "Storage Blob Data Reader" and select the matching role that populates. In the Add role assignment page of the Azure console, "storage blob" has been searched for in the search box. One of the results, Storage Blob Data Reader, is circled.

  5. Click on the Members tab.

  6. Click +Select Members.

  7. Search for the name of the registered app you created during the Create required Azure infrastructure process on Azure Blob Storage Source, and click Select.

  8. Click Review+Assign.

Panther-managed detections

See Panther-managed rules for Azure in the panther-analysis GitHub repository.

Supported log types

Panther supports Microsoft Entra ID audit and sign-in logs which are handled by the Azure.Audit schema.

Azure.Audit

The Azure.Audit log schema covers Microsoft Entra ID audit logs and sign-in logs. For more information, see the Microsoft documentation:

Last updated

Was this helpful?