| eG Monitoring |
|---|
|
Measures reported by AzrMngdIdntyTest The Sign-in logs provided by the Azure Active Directory (AD) portal is a treasure-chest of information about user sign-ins to the Azure organization and how signed-in users use the organization's resources. One of the four types of sign-in logs offered by Azure AD is the Managed Identity for Azure Resources sign-in log. Managed identities provide an automatically managed identity in Azure Active Directory for applications to use when connecting to resources that support Azure Active Directory (Azure AD) authentication. Applications can use managed identities to obtain Azure AD tokens without having to manage any credentials. If managed identity sign-ins fail, then applications will not be able to obtain Azure AD tokens to access critical Azure resources. This can stall application functions and degrade overall application performance. To avoid this, administrators should monitor sign-in attempts made using managed identities, quickly identify those attempts that failed, investigate the reasons for the failure, and fix them, so that the Azure sign-in experience is not impacted. Administrators should also be capable of detecting and investigating spurious sign-in attempts - for instance, frequent sign-in failures from specific IP addresses/locations or an unusually large number of sign-in failures experienced by specific applications/resources/service principals. As this is how hackers work, by capturng such attempts early, administrators can prevent malicious attacks and potential resource abuse. The AzrMngdIdntyTest helps administrators achieve all of the above! This test monitors Azure managed identity sign-in logs for failed sign-ins and reports their count and details. With the help of these details, administrators can effectively troubleshoot the failures. These insights also help administrators closely scrutinize the failed sign-ins to isolate patterns - are sign-in attempts from specific IP addresses/locations failing often? are specific applications/service principals seeing more sign-in failures than others? This way, the test sheds light on sign-in attempts that are ‘suspect’, so their authenticity can be verified, and any potential security risks pre-empted. Outputs of the test : One set of results for the Azure Active Directory tenant being monitored The measures made by this test are as follows:
|