Skip to main content

Audit Logs

Entra ID generates sign-in logs and directory audit logs that Mission Control scrapes as access logs. There are three approaches depending on your infrastructure and latency requirements.

Required Permissions

All approaches require:

  • Entra ID P1 or P2 license — Hard requirement from Microsoft. Free-tier tenants do not generate sign-in logs at all.

These are in addition to the base permissions (User.Read.All, Group.Read.All, etc.) needed by the Entra ID scraper.

Approach Comparison

HTTP + MS GraphLogs ScraperEvent Hub
LatencyMinutes (polling)MinutesSeconds
SetupLowMediumHigh
PermissionsAuditLog.Read.AllAzure Diagnostic SettingsAzure Diagnostic Settings + Event Hub
Best ForDirect API access, simplest setupLogs already forwarded to a backendReal-time, high volume
PaginationManual ($top, $filter)Handled by backendN/A (streaming)
InfrastructureNone extraLog backend (OpenSearch, Loki, etc.)Event Hub + bridge consumer

Latency and Retention

Log Availability Delay

Entra ID logs are not available immediately after the event occurs:

Log CategoryTypical Delay
Interactive sign-ins5 – 15 minutes
Non-interactive sign-ins15 – 30 minutes
Directory audit logs5 – 15 minutes

Set your scraper schedule to at least @every 15m to avoid missing events due to delay.

Retention by License

License TierRetention Period
Free / Office 3657 days
Entra ID P1 / P230 days

For longer retention, export logs via Azure Monitor Diagnostic Settings to a log backend and use the Logs scraper approach.

Approaches