Azure Active Directory

Supported OS Linux Windows Mac OS


Azure Active Directory is a cloud hosted Active Directory offering by Microsoft Azure. This integration allows you to ingest your Azure AD activity logs (audit and sign-in logs) to Datadog.



This integration forwards logs to Datadog using Azure with Event Hubs. Configure Azure AD to forward activity logs to the event hub.


  1. Set up the log forwarding pipeline from Azure to Datadog using Event Hubs by following the Send Azure Logs to Datadog guide.

  2. In Azure portal, select Azure Active Directory > Monitoring > Audit logs.

  3. Select Export Settings.

  4. In the Diagnostics settings pane, do one of the following:

    • To change existing settings, select Edit setting.
    • To add new settings, select Add diagnostics setting. You can have up to three settings.
  5. Select the Stream to an event hub check box, and then select Event Hub/Configure.

  6. Select the Azure subscription and Event Hubs namespace that you created earlier to route the logs to.

  7. Select OK to exit the event hub configuration.

  8. Do one or both of the following. Datadog recommends selecting both.

    • To send audit logs, select the AuditLogs check box.
    • To send sign-in logs, select the SignInLogs check box.
  9. Select Save.

Logs should start coming into Datadog within 15 minutes. For more details on the setup, see the Azure tutorial.

Data Collected

Log collection

This integration allows you to setup log ingestion for Azure Active Directory activity logs.

This includes the following:

  • Sign-ins - Provides information about the usage of managed applications and user sign-in activities.

  • Audit logs - Provides traceability through logs for all changes done by various features within Azure AD.


Azure Active Directory does not include any metrics.


Datadog sends credential expiry events, which grant visibility into credential expirations for Azure app registrations, Key Vault keys, Key Vault secrets, and Key Vault certificates. The Azure Active Directory integration must be installed to receive events for Azure app registrations. Receiving events from Azure also requires installation of the Azure integration.

  • Expiration events are sent 60, 30, 15, and 1 day(s) before credential expiration, and once after expiration.
  • Missing permission events are sent every 15 days. A missing permission event lists the Key Vaults for which Datadog has not been given permissions. If no changes have been made regarding Key Vault permissions in the previous 15-day cycle, the event notification is not sent again.

You can view these events in Event Explorer.


  • To collect Azure app registration expiration events, enable access to the Microsoft Graph API.
  • If a certificate and its associated key and secret expire at the exact same time, one expiration event is sent for all resources.


Need help? Contact Datadog support.