Microsoft Entra ID (the new name for Azure Active Directory) is the identity provider behind Microsoft 365 and most SaaS-federated enterprises. Its Sign-in Logs capture every interactive, non-interactive, service principal, and managed-identity authentication attempt — along with the Conditional Access policy that allowed or blocked it, the risk level (Identity Protection), and the device / location / app context.
For a SOC, Sign-in Logs are usually the primary detection source for:
- Password spraying / credential stuffing.
- Impossible travel / atypical location.
- MFA fatigue and prompt-bombing.
- Token theft and replay (matching session IDs across IPs).
They are typically shipped to Microsoft Sentinel or a 3rd-party SIEM via the diagnostic-settings stream.