Go to Manage > Custom domain names.
Click Add filter.
Set Filter to Status and Value to Verified, and then click Apply.
From the listed domains, copy a name of a domain (preferably one that ends with .onmicrosoft.com) as this will be needed when setting up Entra ID in ADAudit Plus.
Go to Manage > App registrations. Select your application under Owned applications.
Go to Manage > Certificates & secrets.
Click + New client secret.
Enter the description.
Choose 24 Months as the expiration date; this is the maximum value that can be used.
Click Add.
Copy the client secret value (e.g., "14uCILxkHtIVGR3wkCq12341Nd5VtestkkWTyIPrrE=")
Go to Manage > App registrations. Select your application under Owned Applications.
Navigate to Application (Client ID) and click Copy to clipboard.
Select +Add Tenant in the top-right corner.
Select Audit via Azure.
In the Cloud Directory window, choose the Cloud Type based on the national cloud points from the list below:
Entra ID global service (Azure Cloud - Default)
Entra ID for US Government L4 (Azure GCC High Cloud)
Entra ID for US Government L5 (Azure DOD Cloud)
Entra ID China operated by 21Vianet (Azure China Cloud)
Entra ID for Germany (Azure Germany Cloud)
Enter the Tenant Name, Client ID, and Client Secret.
Click Add.
Check if you are using Entra ID Graph API and, if so, migrate using these steps:
Open the ADAudit Plus web console.
Go to Configuration > Configured Server(s) > Cloud Directory.
In the top-right corner, if the Migrate to Microsoft Graph API button is available, then Azure Active Directory Graph API is in use.
If the Back to Entra ID Graph API button is available, then Microsoft Graph API is in use.
Migrate to Microsoft Graph API from Entra ID Graph API by clicking Migrate to Microsoft Graph API at the top-right corner.
Click Yes in the confirmation prompt.
Note: Once you have migrated to Microsoft Graph API, add the necessary minimum privileges using the steps listed here.
If you still want to use Entra ID Graph API, you can find the privileges required below:
Directory.Read.All
To audit your Entra ID (renamed as Entra ID) environment using a Microsoft 365 license, ADAudit Plus uses the Microsoft 365 Management API for all installations after ADAudit Plus build 7050.
Privileges required while using Microsoft 365 Management API
Microsoft Graph API > Directory.Read.All
Office 365 Management API > ActivityFeed.Read
Select the Azure Active Directory service from the Azure services top pane.
Go to Manage > App registrations > + New registration to open the Register an application window.
Enter the application name, for example, ADAudit Plus Application.
Ensure that Accounts in this organizational directory only (zohoadapazure only - Single tenant) is selected under Supported account types.
Click Register.
Go to the Azure portal, and sign in using your Microsoft account.
Select the Azure Active Directory service from the Azure services section.
Go to Manage > App registrations. Select your application under Owned applications.
Go to Manage > API permissions and select + Add a permission to open the Request API permissions window.
Select Office 365 Management APIs.
Choose Application permissions.
In the Request API permissions window, select Application permissions, then check the ActivityFeed.Read box under ActivityFeed. Select Add permissions.
Once again, go to Manage > API permissions > + Add a permission.
Select Microsoft Graph in the Request API permissions window.
Select Application permissions.
Check the Directory.Read.All box under Directory. Select Add permissions.
Select Grant admin consent for <tenant name>.
Click Yes.
Go to Manage > Custom domain names.
Click Add filter.
Set Filter to Status and Value to Verified, and then click Apply.
From the listed domains, copy a name of a domain (preferably one that ends with .onmicrosoft.com) as this will be needed when setting up Entra ID in ADAudit Plus.
Go to Manage > Certificates & secrets.
Click + New client secret.
Type in the description and the expiration date.
Click Add.
Copy the client secret value (e.g., 14uCILxkHtIVGR3wkCq12341Nd5VtestkkWTyIPrrE=).
Go to Manage > App registrations. Select your application under Owned applications.
Navigate to Application (client ID) and click Copy to clipboard.
Select + Add Tenant.
Select Audit via Office 365.
In the Cloud Directory window, enter the Tenant Name, Client ID, and Client Secret.
User sign-ins
User creation/deletion
Group modifications
Role changes
Perform test activities in Entra ID and confirm they appear in ADAudit Plus reports.
Periodically rotate Client Secrets for security.
Ensure required API permissions are not removed from the registered app.
Enable alert profiles in ADAudit Plus for critical Entra ID events.
Review Entra ID reports regularly to ensure complete visibility.
Use filters and custom reports to tailor Entra ID auditing as per compliance needs.