Azure Monitor is a powerful tool that helps organizations gain visibility into their guest user access. It allows organizations to monitor and track the activities of guest users in real-time, and provides detailed reports on user activity.
Azure Monitor Gains Observability Over Guest Users
Microsoft has announced a new security feature for Azure Monitor that provides visibility into guest users. This feature enables customers to monitor and audit the activities of guest users in their environments. It also provides an audit trail of the activities of guest users, allowing customers to track their activities and ensure compliance with security policies.
What’s New?
The new feature provides customers with an audit trail of guest user activities, including logins, file access, and other activities. It also provides customers with the ability to monitor and audit the activities of guest users in their environment. Additionally, customers can use the feature to set up alerts for suspicious activities and take action to prevent unauthorized access.
What’s Important to Know?
The new feature is available for customers with Azure Monitor Standard and Premium plans. It is also available for customers with Azure Active Directory Premium P2 or Azure Active Directory Basic. Customers can use the feature to monitor the activities of guest users in their environment and take action to prevent unauthorized access.
“Azure Monitor now provides customers with the ability to monitor and audit the activities of guest users in their environment,” said Jeff Woolsey, Principal Program Manager at Microsoft. “This feature helps customers ensure compliance with security policies and protect their environment from unauthorized access.”
The new feature provides customers with enhanced visibility into guest user activities and helps them ensure compliance with security policies. It also provides customers with the ability to set up alerts for suspicious activities and take action to prevent unauthorized access.
Key points from the article:
From the Core Infrastructure and Security Blog