Cloud Directory Services Audit Configuration


 

Azure Active Directory

Azure AD can be audited by ADAudit Plus via two methods:

1. Via Azure AD API (Reporting API).

2. Via Office365 Management API (Reporting API).


1. Via Azure AD API

Licensing criteria:

How to configure in ADAudit Plus:

How to get client ID and client secret for configuring in ADAudit Plus:

  • Add a new application in Azure AD (For reporting API).
    • On your Azure AD platform, click on App Registrations -> New Application Registration.
    • Fill in a valid Name (Example: Reporting API Application).
    • Click on Register.

  • Grant appropriate permissions to the created app:
    • Click Azure Active Directory -> App Registrations -> Select your application -> API permissions(Example: Reporting API Application)
    • Select required permissions
      • Use Azure Active Directory Graph API (Default)
        • Click Add permission
        • Select the API Azure Active Directory Graph -> Application permissions
        • Select Directory -> Directory.Read.All
        • Click on Add permissions
        • Select Grant admin consent for 'tenantname'.
        • Click Yes.
      • Use Microsoft Graph API
        • Click Add permission
        • Select the API Microsoft Graph -> Application permissions
        • Select AuditLog -> AuditLog.Read.All
        • Select Directory -> Directory.Read.All
        • Select User -> User.Read.All
        • Select Application -> Application.Read.All
        • Select Group -> Group.Read.All
        • Select DeviceManagementApps -> DeviceManagementApps.Read.All
        • Select DeviceManagementManagedDevices -> DeviceManagementManagedDevices.Read.All
        • Click on Add permissions
        • Select Grant admin consent for 'tenantname'.
        • Click Yes.

  • For auditing azure file shares: Grant appropriate role assignment for the created app:
    • Click Storage accounts -> select your storage account -> click on Access Control (IAM)
    • Click on Add -> Add Role Assignment
    • Select Reader under Role -> Next
    • Click +Select members -> select your created application (Eg: azure_client)
    • Click select
    • click Review + assign

  • Get the client ID and client secret of the created app
    • Click Azure Active Directory -> App Registrations -> Select your application(Example: Reporting API Application).
    • Copy Application ID (Example: 504467c0-57ba-4b01-96c3-f40397adae69), this is your client ID.
    • Click on Certificates & secrets in API access tab.
      • Click on New client secret
      • Enter a suitable key description and duration (Example: Description = ADAudit Plus Key, Duration = Never expires).
      • Click on Add and the secret key will be generated by the portal.
      • Copy the value of your secret key (Example: 14uCILxkHtIVGR3wkCq12341Nd5VtestkkWTyIPrrE=) , this is your client secret.

2. Via Office365 Management API

Licensing criteria:

  • Requires Office365 license.

How to configure in ADAudit Plus:

  • Go to configuration tab, select Cloud Directory,click Add Tenant.
  • Select Audit via Office365.
  • Enter your tenant name(my_org.onmicrosoft.com), client ID, client secret.
  • Click on Add.

How to get client ID and client secret for configuring in ADAudit Plus:

  • Add a new application in Azure AD
    • On your Azure AD platform, click on App Registrations -> New Application Registration.
    • Fill in a valid Name (Example: Reporting API Application).
    • Click on Register.

  • Grant appropriate permissions to the created app:
    • Click Azure Active Directory -> App Registrations -> Select your application -> API permissions(Example: Reporting API Application)
    • Select required permissions
      • Click Add permission
      • Select the API Office 365 Management APIs -> Application permissions
      • Select ActivityFeed -> ActivityFeed.Read
      • Select the API Microsoft Graph -> -> Application permissions
      • Select Directory -> Directory.Read.All
      • Click on Add permissions
      • Select Grant admin consent for 'tenantname'.
      • Click Yes.

  • Get the client ID and client secret of the created app
    • Click Azure Active Directory -> App Registrations -> Select your application(Example: Reporting API Application).
    • Copy Application ID (Example: 504467c0-57ba-4b01-96c3-f40397adae69), this is your client ID.
    • Click on Certificates & secrets in API access tab.
      • Click on New client secret
      • Enter a suitable key description and duration (Example: Description = ADAudit Plus Key, Duration = Never expires).
      • Click on Add and the secret key will be generated by the portal.
      • Copy the value of your secret key (Example: 14uCILxkHtIVGR3wkCq12341Nd5VtestkkWTyIPrrE=) , this is your client secret.

Microsoft Graph API Migration from Azure AD Graph API

  • How to migrate existing cloud directory:
    • Click on Configuration tab. Select Cloud Directory
    • Click on Migrate to Microsoft Graph API
    • Click Yes
  • Required Permissions for application:
    • Click Add permission
    • Select the API Microsoft Graph -> Application permissions
    • Select AuditLog -> AuditLog.Read.All
    • Select Directory -> Directory.Read.All
    • Select User -> User.Read.All
    • Select Application -> Application.Read.All
    • Select Group -> Group.Read.All
    • Click on Add permissions
    • Select Grant admin consent for 'tenantname'.
    • Click Yes.

Migrating a O365 tenant configuration from Cmdlet to Office 365 Management API

  • How to migrate an existing cloud directory:
    • Click on Configuration tab. Select Cloud Directory
    • From the available actions, select the Migrate Action for the tenant to be migrated
    • Enter the client ID, client secret created with O365 API permissions
    • Click Migrate
  • Required Permissions for application:
    • Click Add permission
    • Select the API Office 365 Management APIs -> Application permissions
    • Select ActivityFeed -> ActivityFeed.Read
    • Select the API Microsoft Graph -> -> Application permissions
    • Select Directory -> Directory.Read.All
    • Click on Add permissions
    • Select Grant admin consent for 'tenantname'.
    • Click Yes.
Copyright © 2014, ZOHO Corp. All Rights Reserved.