Documentation forAccess Rights Manager

Configure Azure Active Directory (AAD) Logga

To enable the AAD Logga, you must have completed the preparation for Office 365 integration in the Azure Portal.

The AAD Logga uses Azure audit log search functionalities. In some cases the Azure audit log search has to be enabled. Please also keep in mind that Microsoft states that it may take up to 24 hours until events are available to the audit log search.

How to enable the audit log search and more information regarding the Azure audit log can be found in the article Search the audit log in the Security & Compliance Center (© 2020 Microsoft,, obtained an April 1, 2020).


Start the Access Rights Manager configuration application and click "Scans".


Select "Logga - Active Directory" (same as for AD on-premise).


  1. No entry required - can be ignored.

  2. Select the placeholder "Microsoft Azure AD".

  3. Select a collector server. Note, that the collector server needs internet access to pull AAD events.
  4. Click Apply.


  1. Newly added resources are always at the bottom.
  2. You have created a AAD Logga configuration.
  3. The warning indicates that not all required settings are made.
  4. Click one of the links.


  1. Enter the tenant, for example "".
  2. Enter the application ID.
  3. Enter the client secret.

The application ID and the client secret were created during the preparation for Microsoft 365 integration.

  1. Determine the interval for pulling events from AAD to the collector server. Default value: 60 Seconds.
  2. You must enter a comment.
  3. Click "Apply".


  1. Optional: Give the AAD Logga configuration a new name.
  2. Specify the interval at which the Logga data is written from the collector to the ARM database. Default value: 10 minutes.
  3. You can reduce the amount of data being collected by setting filters. Please see also: Filter AD Logga events.
  4. Turn on the Logga.