SOLVED

Conditional Access Reporting

Contributor

are there any built in conditional access reporting for changes to the policy? 

any way to alert or report when the policy changes and who made the change?

5 Replies

Any changes are visible in the Audit log: https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/Audit

You can also access it programmatically via the Graph API.

@Vasil Michev 

i set it that to 30 days and tried reviewing logs with and without the filter for service=conditional access with no results.

 

we send our logs to splunk, and i do see some data but it looks like it comes from o365 management logs. but that also only fetches at some frequency, i'd prefer to alert from azure so its more realtime.

 

 

best response confirmed by gd-29 (Contributor)
Solution

@gd-29 You can use Log Analytics to create your own alerts I've found following article how to implement your custom alerts: https://tech.nicolonsky.ch/conditional-access-and-azure-log-analytics-in-harmony/

They also requested this feature on uservoice but it's still not implemented: https://feedback.azure.com/forums/169401-azure-active-directory/suggestions/19331617-change-tracking...

 

You can also use Azure Sentinel. connect your Azure AD Data Connector: https://docs.microsoft.com/en-us/azure/sentinel/connect-azure-active-directory

And implement your own Rules

@JordyBlommaert thanks!

 

this is a huge improvement. whats interesting is the querys from azure audit logs are way easier to see who made a change to the policy, but doesn't show what the change was (even though there is a new and old value field, its not accurate). 

the data we collect in splunk shows the policy as its changed (not the old values), but doesn't seem to have the account that changed it, it shows some random API accounts. i'm assuming these are log entries from a backend process that we are capturing once you make the change in the website.

 

i'll post back if i get this in a better place.

@gd-29 Hey, I'm too late for this! But found a detailed blog on conditional access reporting, so thought of suggesting here.

https://blog.admindroid.com/an-admins-complete-guide-to-monitor-conditional-access-policy-changes/

You can monitor conditional access policy changes within the Azure portal itself!

  1. Analyze Sign-in behaviors due to CA policies using Azure AD Sign-in logs.
  2. Discover What’s Happening in CA policies using Audit logs.
  3. Use Azure AD Conditional Access insights and reporting workbook.
  4. Get CA policies using Azure log analytics query auditing.

This gives a whole lot of sign-in details, policy triggers, and actions completely.