Sign-in Logs

Sign-in logs provide insights into how users are accessing your organization's applications and resources. They are a critical component for security monitoring, troubleshooting, and compliance.

Key Information in Sign-in Logs

Each sign-in event record contains detailed information, including:

Accessing Sign-in Logs

You can access sign-in logs through the Azure portal, Microsoft Graph API, or by sending logs to a SIEM solution.

Azure Portal

  1. Sign in to the Azure portal with an appropriate role (e.g., Security Reader, Reports Reader).
  2. Navigate to Azure Active Directory.
  3. Under the Monitoring & health section, select Sign-in logs.

Microsoft Graph API

The Microsoft Graph API provides programmatic access to sign-in logs. You can use the }/auditLogs/signIns endpoint.

GET https://graph.microsoft.com/v1.0/auditLogs/signIns

Common Use Cases

Filtering and Searching

The Azure portal provides powerful filtering and search capabilities to help you find specific sign-in events. You can filter by:

Note: Sign-in logs are retained for 30 days by default for most Azure AD tiers. Consider configuring diagnostic settings to export logs for longer retention.

Example Sign-in Event

Field Value
User Principal Name user@example.com
Application Name Microsoft Office 365
Status Success
IP Address 203.0.113.45
Location New York, USA
Device Windows 10, Chrome
Authentication Method Password, MFA
Timestamp 2023-10-27 10:30:00 UTC
Important: Regularly review sign-in logs, especially after implementing new security policies, to ensure they are effective and to detect any anomalies promptly.
Tip: Integrate Azure AD sign-in logs with your SIEM solution for centralized security monitoring and correlation with other security events.