Cloud Log Dashboard

Overview of log sources across major cloud platforms

Made by Christian Henriksen, Sagalabs.dk
Azure Log Sources
Log sources available in Azure and their configuration details
SourceContentsLog NameNoteDefaultRetentionData VolumeLocationRecommended LevelImpact
PurviewAuthentication eventsunified_audit_logRecords all authentication activity & M365. One of the most valuable logs from Azure. Enabled by default on modern tenants, but may need to be manually enabled on older tenants.
180 days
High
Security Center > Audit Logs
Enable long-term storage and SIEM integration
Very important
Entra IDSignin logsSignin logsTracks user sign-in activity
Free: 7 days, P1/P2: 30 days
Medium
Entra ID > Monitoring > Sign-ins
Archive for at least 1 year
Very important
Entra IDManaged identity sign-insmanagedidentitysigninlogsTracks managed identity authentication
Free: 7 days, P1/P2: 30 days
Medium
Entra ID > Monitoring > Sign-ins
Archive for at least 1 year
Very important
Entra IDNon-interactive user sign-insnoninteractiveusersigninlogsTracks token-based authentication without user interaction, including service principal and app token usage
Free: 7 days, P1/P2: 30 days
Medium
Entra ID > Monitoring > Sign-ins
Archive for at least 1 year
Very important
Entra IDService principal sign-insserviceprincipalsigninlogsTracks authentication by apps and services using service principals (non-user identities)
Free: 7 days, P1/P2: 30 days
Medium
Entra ID > Monitoring > Sign-ins
Archive for at least 1 year
Very important
Entra IDADFS sign-insADFSSigninlogsTracks sign-ins where Active Directory Federation Services (AD FS) was used as the identity provider. Requires ADFS integration
Free: 7 days, P1/P2: 30 days
Medium
Entra ID > Monitoring > Sign-ins
Archive for at least 1 year
Very important
Entra IDTenant wide actionsauditlogsRecords admin actions like app registration
Free: 7 days, P1/P2: 30 days
Low
Entra ID > Monitoring > Audit logs
Archive for at least 1 year
Very important
SubscriptionResource creation/deletion/accessactivitylogsRequires configuration per subscription
90 days
Very High
Subscription > Activity Log
Archive for at least 90 days
important
Operating SystemWindows event logsWADWindowsEventLogsTableRequires agent installation on VMs
None
Very High
VM settings > Diagnostics
Configure based on security requirements
important
Operating SystemLinux event logsLinuxSyslogVer20Requires agent installation on VMs
None
Very High
VM settings > Diagnostics
Configure based on security requirements
important
ResourceResource specific eventseach resource has its own logVaries by resource type
None
Very High
Resource > Diagnostic Settings
Enable read logging at minimum
Very important
ResourceStorageRead: Access to storage containersStorageReadConfigure for each storage container
None
Very High
Storage Account > Diagnostics
Enable read logging at minimum
Very important
ResourceNSG Flow: Network flow logsnetworksecuritygroupflowEventConfigure for each NSG
None
Extremely High
NSG > Diagnostic settings
Archive for at least 30 days
Nice to have