5.7 Enabling the Entra ID Connector
Enabling the Entra ID Connector
By the end of this subsection, you will have configured the Entra ID diagnostic settings to send sign-in and audit logs to your Sentinel workspace.
The M365 Defender connector brings device, email, and cloud app data. The Entra ID connector brings identity data — sign-in logs, audit logs, and provisioning logs. Together, they give your workspace the complete picture.
Why a separate connector?
Entra ID data is not part of the Defender XDR data pipeline. It flows through Azure Monitor diagnostic settings, not the Defender connector. This means you configure it separately, and it uses a different ingestion path.
Configuration
- Navigate to Entra ID → Monitoring → Diagnostic settings
- Click Add diagnostic setting
- Name it:
sentinel-signin-audit - Select the log categories to send:
Select these:
- SignInLogs (interactive sign-ins)
- NonInteractiveUserSignInLogs (token refreshes, API calls)
- AuditLogs (directory changes, app consents, group changes)
- ServicePrincipalSignInLogs (app-to-app authentication)
- RiskyUsers (identity protection risk events)
- UserRiskEvents (risk event details)
Optional (enable if needed):
- ManagedIdentitySignInLogs (Azure managed identity sign-ins)
- ProvisioningLogs (user provisioning events)
- ADFSSignInLogs (on-premises ADFS, if applicable)
- Under Destination details, select Send to Log Analytics workspace
- Select your Sentinel workspace
- Click Save
Module 4 taught you that token replay appears only in NonInteractiveUserSignInLogs. If you enable only SignInLogs (interactive), you miss the entire token replay detection pattern. Always enable both. The non-interactive table is higher volume but contains the most critical investigation data.
Verification
| |
| TableName | EventCount | LastEvent |
|---|---|---|
| SigninLogs | 234 | 2026-03-21 14:30 |
| AADNonInteractiveUserSignInLogs | 1,847 | 2026-03-21 14:32 |
| AuditLogs | 42 | 2026-03-21 14:28 |
The RiskyUsers and UserRiskEvents tables only populate if you have Entra ID P2 licensing. E5 includes P2. If you are on E3, these tables will exist but remain empty. This means risk-based conditional access and identity protection analytics rules will not have data to work with.
Check your understanding
1. You enabled SignInLogs in the diagnostic settings but not NonInteractiveUserSignInLogs. What detection capability did you lose?