Reviewing Azure AD activity by using Log Analytics and Microsoft Sentinel
In this section, we will go through the step-by-step process of running a log query for Azure AD activity within Microsoft Sentinel. We will also step through how to review Azure AD workbooks and save the workbooks for monitoring, reviewing, and exporting:
- Navigate to your Microsoft Sentinel workspace from within
portal.azure.com
:

Figure 15.17 – Microsoft Sentinel workspace
- Select Logs under the General menu to access the Log Analytics workspace that is connected to Microsoft Sentinel. There is a video available here to provide an overview of Log Analytics. Select the X icon at the top right to close this video window:

Figure 15.18 – Microsoft Sentinel Logs screen
- A tile of common queries opens. Select the X icon on the right to close this tile:

Figure 15.19 – Common queries...