Forum Discussion
Export Active directory Identity protection Risky user events to EventHub/ SIEM
Dear community,
I cannot find the Risky user events "User at risk detected" on Azure Activity Logs, Sign-in Logs or Audit Logs.
Are these events being logged somewhere?
I'm looking for a way to export or stream this type of events to EventHub so I can then pull or ingest the events into a 3rd Party SIEM solution (i.e. SPlunk, QRadar)
Thank you for your help!
You can use the Graph API endpoints as detailed here: https://docs.microsoft.com/en-us/graph/api/resources/identityprotection-root?view=graph-rest-beta
- Manuel_DEsteCopper Contributor
Thank you VasilMichev , this is great to query Risky user data but I still cannot see away to Stream these events to EventHub when they occurs like for example is possible to Activity Logs or Sign-in logs.
- Franck1304Brass Contributor
I also would like to bring up this topic.
After some research I found out how to stream AAD Audit logs to an Event Hub and eventually import these to a SIEM.
However I can not find a way to stream Sign In and User Risk Events to an EventHub.
Anybody already done this?
Thanks,
Franck