Microsoft Graph Activity Logs¶

About¶
Microsoft Graph activity logs are an audit trail of all HTTP requests that the Microsoft Graph service received and processed for a tenant.
Product Details¶
Vendor URL: Microsoft Graph Activity Logs
Product Type: Audit
Product Tier: Tier III
Integration Method: At the time of the creation of this document, an existing integration method does not exist.
Integration URL: n/a
Log Guide: Microsoft Graph Activity Logs overview
Parser Details¶
Log Format: JSON
Expected Normalization Rate: near 100%
Data Label: MICROSOFT_GRAPH_ACTIVITY_LOGS
UDM Fields (list of all UDM fields leveraged in the Parser):
| Log File Field | UDM Field |
|---|---|
| "Microsoft" | metadata.vendor_name |
| "Graph Activity" | metadata.product_name |
| NETWORK_HTTP | metadata.event_type |
| TimeGenerated | metadata.event_timestamp |
| AadTenantId | metadata.product_deployment_id |
| Type | metadata.product_event_type |
| UniqueRecordId | metadata.product_log_id |
| ApiVersion | metadata.product_version |
| ClientAuthMethod | extensions.auth.auth_details |
| ClientRequestId | principal.process.pid |
| IPAddress | principal.ip |
| UserId | principal.user.userid |
| ServicePrincipalId | principal.user.userid |
| Wids | principal.user.attribute.roles |
| TenantId | principal.resource.product_object_id |
| "CLOUD_ORGANIZATION" | principal.resource.resource_type |
| Internal_WorkspaceResourceId | principal.asset.attribute.cloud.project.product_object_id |
| Location | principal.location.country_or_region |
| AppId | target.application |
| RequestUri | target.url |
| RequestMethod | network.http.method |
| ResponseStatusCode | network.http.response_code |
| RequestId | network.session_id |
| UserAgent | network.http.user_agent |
| ResponseSizeBytes | network.received_bytes |
| DurationMs | security_result.detection_fields |
| Roles | security_result.detection_fields |
| Scopes | security_result.detection_fields |
| SignInActivityId | security_result.detection_fields |
| tokenIssuedAt | security_result.detection_fields |
Product Event Types¶
| Product Event | Description | UDM Event |
|---|---|---|
| All | All events | NETWORK_HTTP |
Log Sample¶
{"TimeGenerated":"2024-02-06T15:53:30.6677512Z","Location":"West Central US","RequestId":"requestId","OperationId":"operationId","ClientRequestId":"clientRequestId","ApiVersion":"v1.0","RequestMethod":"GET","ResponseStatusCode":200,"AadTenantId":"aadTenantId","IPAddress":"0000:0000:306:1838::5","RequestUri":"https://graph.microsoft.com/v1.0/users/","DurationMs":1412690,"ResponseSizeBytes":4872,"SignInActivityId":"signinId","Roles":"GroupMember.Read.All User.Read.All","TokenIssuedAt":"2024-02-06T15:47:59.0000000Z","AppId":"appId","ServicePrincipalId":"principalId","IdentityProvider":"https://sts.windows.net/","ClientAuthMethod":2,"Wids":"wids","_UniqueRecordId":"uniqueId","_Internal_WorkspaceResourceId":"/subscriptions/id/resourcegroups/","Type":"MicrosoftGraphActivityLogs","TenantId":"tenantId"}
Sample Parsing¶
metadata.product_log_id = "uniqueId"
metadata.event_type = "NETWORK_HTTP"
metadata.vendor_name = "Microsoft"
metadata.product_name = "Graph Activity"
metadata.product_event_type = "MicrosoftGraphActivityLogs"
metadata.product_deployment_id = "aadTenantId"
principal.user.userid = "principalId"
principal.user.attribute.roles.name = "wids"
principal.process.pid = "clientRequestId"
principal.asset.attribute.cloud.project.product_object_id = "/subscriptions/id/resourcegroups/"
principal.ip = "0000:0000:306:1838::5"
principal.location.country_or_region = "West Central US"
principal.resource.resource_type = CLOUD_ORGANIZATION
principal.product_object_id = "tenantId"
target.url = "https://graph.microsoft.com/v1.0/users/"
target.application = "appId"
security_result.detection_fields.key = "roles"
security_result.detection_fields.value = "GroupMember.Read.All"
security_result.detection_fields.detection_fields.key = "roles"
security_result.detection_fields.value = "User.Read.All"
security_result.detection_fields.key = "signInActivityId"
security_result.detection_fields.value = "signinId"
security_result.detection_fields.key = "tokenIssuedAt"
security_result.detection_fields.value = "2024-02-06T15:47:59.0000000Z"
network.received_bytes = 4872
network.session_id = "requestId"
network.http.method = "GET"
network.http.response_code = 200
extensions.auth.type = SSO
extensions.auth.mechanism = NETWORK
extension.auth_details = "2 - certificate"