Policy: Azure > CIS v5.0 > 6 - Management and Governance Services > 6.01 - Logging and Monitoring > 6.01.01 - Configuring Diagnostic Settings > 6.01.01.08 - Ensure that a Microsoft Entra diagnostic setting exists to send Microsoft Graph activity logs to an appropriate destination
Configures auditing against a CIS Benchmark item.
Level: 2
Ensure that Microsoft Entra ID Graph activity logs are integrated with Azure Monitor for centralized logging and analysis.
Microsoft Graph logs provide visibility into activity performed through the Microsoft Graph API, including operations on Entra ID resources. These logs are essential for security monitoring and incident response as they capture API-level operations that may not be visible in standard Entra ID audit logs.
Targets
This policy targets the following resource types:
Primary Policy
This policy is used with the following primary policy:
Related Policies
Controls
Setting this policy configures this control:
Policy Specification
Schema Type | |
|---|---|
Default | |
Valid Values [YAML] |
|
Category
In Your Workspace
Developers
- tmod:@turbot/cis#/control/categories/cis
- tmod:@turbot/azure-cisv5-0#/policy/types/r06010108
- turbot graphql policy-type --id "tmod:@turbot/azure-cisv5-0#/policy/types/r06010108"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/azure-cisv5-0#/policy/types/r06010108"
Get Policy TypeGet Policy Settings
Category URI
Policy Type URI
GraphQL
CLI