Connect this data source on your own, using the Hunters platform.
Overview
Table name: azure_signin
Azure Sign-In Logs are logs that provide information about authentication events in Azure Entra ID, including the date and time, user identity, status, and client used, and can be used for monitoring and compliance purposes.
Send data to Hunters
STEP 1: Set up Azure Event Hub
Before setting up the connection on the Hunters platform, you'll need to set up and create an Azure Event Hub.
Follow this guide to complete the set up.
STEP 2: Route logs to the Event Hub
-
In the Azure portal home screen, open the side menu and click Azure Entra ID.
-
Now, scroll down the side menu to the Monitoring section, and click Sign-in Logs.
-
Click Export Data Settings.
The Diagnostic Settings page opens.
-
Click Add Diagnostic setting.
-
Under Logs, check the following boxes:
a. SignInLogs
b. NonInteractiveUserSignInLogs
c. ServicePrincipalSignInLogs
d. ManagedIdentitySignInLogs -
Under Destination details, check the Stream to an Event Hub option.
-
Fill in the requested details and give the diagnostic setting a name.
-
Click Save.
STEP 3: Set up the connection on Hunters
-
Open the Hunters platform and navigate to Data > Data Sources.
-
Click ADD DATA SOURCES.
-
Locate the Microsoft Azure panel and click Connect.
The Add Data Flows window opens. -
Fill in the required Azure application details, as gathered here under STEP 2.
- Under the Data Types section, activate the data types you want to connect.
-
For each activated data type, fill in the required information, as gathered here:
- Under STEP 1 - Subscription ID
- Under STEP 3 - Resource group name and Event Hub namespace and
- Under STEP 4 - Event Hub name.
- OPTIONAL: Under the Consumer group field you can specify a specific Azure Event Hub consumer group, or leave this field empty to use the default consumer group.
- Click Test Connection to make sure everything was set up correctly.
- Once the connection is established, click Submit.
Expected format
{ "time": "2023-08-02T01:00:24.0727263Z", "resourceId": "/tenants/aaaa-1111/providers/Microsoft.aadiam", "operationName": "Sign-in activity", "operationVersion": "1.0", "category": "SignInLogs", "tenantId": "aaaa-1111", "resultType": "0", "resultSignature": "None", "durationMs": 0, "callerIpAddress": "1.1.1.1", "correlationId": "2222-bbbb", "identity": "John Doe", "Level": 4, "location": "US", "properties": {"id":"1111","createdDateTime":"2023-08-02T00:58:04.7475611+00:00","userDisplayName":"John Doe","userPrincipalName":"john.doe@domain.com","userId":"asdf-1234","appId":"cccc-3333","appDisplayName":"Windows Sign In","ipAddress":"1.1.1.1","status":{"errorCode":0},"clientAppUsed":"Mobile Apps and Desktop clients","userAgent":"Windows-AzureAD-Authentication-Provider/1.0","deviceDetail":{"deviceId":"cccc-3333","displayName":"AA-22","operatingSystem":"Windows","trustType":"Azure AD joined"},"location":{"city":"Alameda","state":"California","countryOrRegion":"US","geoCoordinates":{"latitude":37.75,"longitude":-122.24}},"correlationId":"xxx","conditionalAccessStatus":"notApplied","appliedConditionalAccessPolicies":[],"authenticationContextClassReferences":[],"originalRequestId":"xxx","isInteractive":true,"tokenIssuerName":"","tokenIssuerType":"AzureAD","authenticationProcessingDetails":[{"key":"Legacy TLS","value":"False"},{"key":"Is CAE Token","value":"False"}],"networkLocationDetails":[],"clientCredentialType":"none","processingTimeInMilliseconds":67,"riskDetail":"none","riskLevelAggregated":"none","riskLevelDuringSignIn":"none","riskState":"none","riskEventTypes":[],"riskEventTypes_v2":[],"resourceDisplayName":"Windows Azure Entra ID","resourceId":"xxx","resourceTenantId":"xxx","homeTenantId":"xxx","tenantId":"xxx","authenticationDetails":[],"authenticationRequirementPolicies":[],"sessionLifetimePolicies":[],"authenticationRequirement":"singleFactorAuthentication","servicePrincipalId":"","userType":"Member","flaggedForReview":false,"isTenantRestricted":false,"autonomousSystemNumber":6167,"crossTenantAccessType":"none","privateLinkDetails":{},"ssoExtensionVersion":"","uniqueTokenIdentifier":"-xxx","authenticationStrengths":[],"incomingTokenType":"none","authenticationProtocol":"none","appServicePrincipalId":null,"resourceServicePrincipalId":"xxx","rngcStatus":0}}