Creating Policy Alerts for Office 365 Azure Active Directory

Create custom policies to generate alerts for actions on resources that are specific to your Office 365 Azure AD (Active Directory) environment.

Prerequisite: Ensure that you have followed the instructions in Getting Started with Policies to review available managed policies, and any custom policies that already exist, before creating a new custom policy.

You can create policies for actions and resources in Azure AD.

Note:

If you registered your Office 365 instance before April 2016, to enable the features for SharePoint and OneDrive and for Azure AD, you must reenter the Oracle CASB Cloud Service user's credentials for your registered application instance in the credentials update page. Select Applications, click the icon for the instance to display the Health Summary, and then Modify, Update Credentials.

Creating Alerts for Azure AD User, Group, and Role Management

Create a policy that generates an alert for unwarranted actions related to sensitive files and folders.

You can create policies for unwarranted actions related to sensitive files and folders in Office 365 Azure Active Directory (AD). For example, a policy can be triggered and generate an alert you when someone creates a self-service tenant from a domain that you want to exclude from membership.

For instructions about how to create a policy alert for Office 365, see any of the topics for Creating Policy Alerts for Office 365 Exchange Online.

Here are the resources and actions for Azure AD that you can make the target of a policy.

Resource Action/Event Name Trigger for Policies with This Resource and Action

AzureAD User

Add

An administrator adds a user to the directory. This can be a new user in your organization, a user with an existing Microsoft account, or a user in another Azure AD directory that this administrator manages.

Delete

An administrator deletes a user from the directory.

Update

An administrator updates a user in the directory. The Azure AD logs should show the attributes that were updated.

Reset user password

An administrator resets the password for a user in the directory.

Change user password

An administrator changes the password for a user in the directory.

Set force change user password

An administrator sets the property that forces a user to change his or her password on login.

Set license properties

An administrator sets the license properties for a user in the directory.

Change user license

An administrator changes the license assigned to a user in the directory. To see what licenses were updated, look in the Azure AD logs for an "Update user" event immediately before or after this event.

AzureAD Authentication

Failed login

User login failed.

Login

User logged in successfully.

AzureAD Group

Add group

An administrator creates a group in the directory. This event is of interest for groups with special privileges.

Update group

An administrator updates a group in the directory. This event is of interest for groups with special privileges.

Delete group

An administrator deletes a group from the directory. This event is of interest for groups with special privileges.

Add member to group

An administrator adds a member to a group in the directory. This event is of interest for groups with special privileges.

Remove member from group

An administrator removes a member from a group in the directory. This event is of interest for groups with special privileges.

AzureAD Role Events

Add role member

An administrator adds a user to a directory role (a set of permissions). This can be a sensitive operation if the role is highly privileged.

Remove role member

An administrator removes a user from a directory role (a set of permissions). This can be a sensitive operation if the role is highly privileged.

Set company contact information

An administrator sets company-level contact preferences, including email addresses for marketing and technical notifications about Microsoft Online Services.

Directory

Set federation settings on domain

Update the federation settings for a domain.

Verify domain

Verify a domain in the directory.

Verify email domain

Do email verification of a domain in the directory.

Set DirSyncEnabled flag on company

Set the property that enables a directory for Azure AD Sync.

Set Password Policy

Set length and character constraints for user passwords.

Set Company Information

Update company-level information. See the Get-MsolCompanyInformation PowerShell cmdlet for more information.

Creating Alerts for Azure AD Application and Directory Management

Create a policy that generates an alert for unwarranted actions related to sensitive files and folders.

You can create policies for actions related to application and directory management in Office 365 Azure AD (for example, when someone creates a self-service tenant from a domain that you want to exclude from membership).

For instructions about how to create a policy alert, see the topics for Creating Policy Alerts for Office 365 Exchange Online.

Here are the resources and actions for Azure AD that you can make the target of a policy.

Resource Action/Event Name Trigger for Policies with This Resource and Action

AzureAD Application Events

Add service principal

An administrator adds a service principal to the directory.

A Service Principal can be tied to an application (often, the application is single sign on). A Service Principal grants the application access to resources in the directory.

Remove service principal

An administrator removes a service principal from the directory.

Add service principal credentials

An administrator adds authentication credentials to a service principal. After adding an application, an administrator can add a Service Principal that is tied to the application. Often, the purpose of the application is single sign-on. Adding a Service Principal grants the application access to resources in the directory.

Remove service principal credentials

An administrator removes authentication credentials for a service principal.

Add delegation entry

An administrator creates an OAuth2PermissionGrant in the directory to show the resources that each client may access and the permission level for each resource.

Set delegation entry

An administrator updates an OAuth2PermissionGrant in the directory.

Remove delegation entry

An administrator deletes an OAuth2PermissionGrant in the directory. The oauth2PermissionGrants show the resources that each client may access and the permission level for each resource.

AzureAD Directory Events

Add application

An application has been added to the directory.

Add partner to company

Add a partner to the directory.

Remove partner from company

Remove a partner from the directory.

Remove domain from company

Remove a domain from the directory.

Update domain

Update a domain in the directory.

Set domain authentication

Change the default domain setting for the company.

Set federation settings on domain

Update the federation settings for a domain.

Verify domain

Verify a domain in the directory.

Verify email domain

Do email verification of a domain in the directory.

Set DirSyncEnabled flag on company

Set the property that enables a directory for Azure AD Sync.

Set Password Policy

Set length and character constraints for user passwords.

Set Company Information

Update company-level information.