🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided SC-300 Domain 4
Domain 4 — Module 6 of 6 100%
27 of 27 overall

SC-300 Study Guide

Domain 1: Implement and Manage User Identities

  • Your Entra Tenant: Branding, Settings & Domains
  • Entra Roles & Administrative Units
  • Managing Users & Groups
  • Device Registration & Licensing
  • External Identities: Guest Access & B2B
  • Cross-Tenant Access & Synchronisation
  • Hybrid Identity: Connect Sync vs Cloud Sync
  • Hybrid Authentication: PHS, PTA & Seamless SSO

Domain 2: Implement Authentication and Access Management

  • Authentication Methods: Plan & Implement
  • Passwordless & Windows Hello for Business
  • MFA, SSPR & Password Protection
  • Conditional Access: Plan & Build Policies
  • Conditional Access: Advanced Controls & Troubleshooting
  • Entra ID Protection: Risk-Based Security
  • Global Secure Access: Zero Trust Networking

Domain 3: Plan and Implement Workload Identities

  • Workload Identities: Managed Identities & Service Principals
  • Enterprise Apps: SSO, App Proxy & Integration
  • Enterprise Apps: Users, Consent & Collections
  • App Registrations: Build & Secure
  • Defender for Cloud Apps: Discover & Control
  • Defender for Cloud Apps: Policies & OAuth Governance

Domain 4: Plan and Automate Identity Governance

  • Entitlement Management: Catalogs & Access Packages Free
  • Access Requests, Terms of Use & External Lifecycle Free
  • Access Reviews: Plan, Create & Monitor Free
  • PIM: Protect Your Privileged Roles Free
  • PIM: Azure Resources, Groups & Audit Free
  • Identity Monitoring: Logs, KQL & Secure Score Free

SC-300 Study Guide

Domain 1: Implement and Manage User Identities

  • Your Entra Tenant: Branding, Settings & Domains
  • Entra Roles & Administrative Units
  • Managing Users & Groups
  • Device Registration & Licensing
  • External Identities: Guest Access & B2B
  • Cross-Tenant Access & Synchronisation
  • Hybrid Identity: Connect Sync vs Cloud Sync
  • Hybrid Authentication: PHS, PTA & Seamless SSO

Domain 2: Implement Authentication and Access Management

  • Authentication Methods: Plan & Implement
  • Passwordless & Windows Hello for Business
  • MFA, SSPR & Password Protection
  • Conditional Access: Plan & Build Policies
  • Conditional Access: Advanced Controls & Troubleshooting
  • Entra ID Protection: Risk-Based Security
  • Global Secure Access: Zero Trust Networking

Domain 3: Plan and Implement Workload Identities

  • Workload Identities: Managed Identities & Service Principals
  • Enterprise Apps: SSO, App Proxy & Integration
  • Enterprise Apps: Users, Consent & Collections
  • App Registrations: Build & Secure
  • Defender for Cloud Apps: Discover & Control
  • Defender for Cloud Apps: Policies & OAuth Governance

Domain 4: Plan and Automate Identity Governance

  • Entitlement Management: Catalogs & Access Packages Free
  • Access Requests, Terms of Use & External Lifecycle Free
  • Access Reviews: Plan, Create & Monitor Free
  • PIM: Protect Your Privileged Roles Free
  • PIM: Azure Resources, Groups & Audit Free
  • Identity Monitoring: Logs, KQL & Secure Score Free
Domain 4: Plan and Automate Identity Governance Free ⏱ ~14 min read

Identity Monitoring: Logs, KQL & Secure Score

Monitor identity events through sign-in, audit, and provisioning logs, write KQL queries in Log Analytics, use workbooks for reporting, and improve security posture with Identity Secure Score.

Identity Monitoring and Secure Score

☕ Simple explanation

Monitoring is like the security cameras and health dashboard for your identity system.

Imagine your building has three camera feeds: one at the front door recording who enters and leaves (sign-in logs), one in the admin office recording all changes to keys and access cards (audit logs), and one tracking the badge-printing machine (provisioning logs). Right now, these recordings are on a short loop — you only keep a few days. Diagnostic settings let you save them long-term to a video archive (Log Analytics).

KQL is like a smart search bar for those recordings — you can ask “show me everyone who entered after midnight last week” and get instant results. Identity Secure Score is your building’s safety rating — it tells you what to fix to be more secure.

Microsoft Entra ID generates three types of logs: sign-in logs (authentication events), audit logs (directory change events), and provisioning logs (user provisioning events). By default, these are retained for a limited period in the Entra admin center.

To enable long-term retention and advanced querying, you configure diagnostic settings to route logs to Log Analytics workspaces, storage accounts, or Event Hubs. Once in Log Analytics, you can query logs with KQL (Kusto Query Language), build workbooks for visual dashboards, and set up alerts for suspicious patterns.

Identity Secure Score provides a normalised score with prioritised recommendations to improve your Entra ID security configuration.

The three log types

Understanding what each log captures is a common exam question:

FeatureSign-in LogsAudit LogsProvisioning Logs
What it recordsAuthentication events (successful and failed sign-ins)Directory changes (user created, role assigned, policy changed)User provisioning to/from apps (SCIM, HR-driven)
Key data pointsUser, app, location, device, CA policy result, MFA status, risk levelWho changed what, when, old value vs new valueSource system, target system, user matched, action taken, status
Retention (Entra portal)30 days (P2) or 7 days (Free)30 days (P2) or 7 days (Free)30 days (P2) or 7 days (Free)
Log Analytics tableSigninLogs, AADNonInteractiveUserSignInLogs, AADServicePrincipalSignInLogs, AADManagedIdentitySignInLogsAuditLogsAADProvisioningLogs
Common investigationFailed sign-ins, risky sign-ins, MFA failures, location anomaliesUnauthorized changes, role assignments, policy modificationsProvisioning failures, attribute mapping issues
💡 Exam tip: Sign-in log types

There are actually four sign-in log categories:

  1. Interactive user sign-ins — a human typing credentials
  2. Non-interactive user sign-ins — token refreshes, background SSO
  3. Service principal sign-ins — apps authenticating with client credentials
  4. Managed identity sign-ins — Azure resources authenticating via managed identity

The exam may ask which log captures a specific scenario. A background token refresh is non-interactive, not interactive. An Azure Function calling Microsoft Graph with a managed identity appears in managed identity sign-ins.

Configuring diagnostic settings

By default, logs only live in the Entra portal for 7–30 days. To keep them longer and query them with KQL, you must configure diagnostic settings.

Three destinations:

DestinationPurposeBest For
Log Analytics workspaceStore and query with KQL, build workbooks, set alertsPrimary destination for monitoring and investigation
Azure Storage accountLong-term archival at low costCompliance — keeping logs for years
Azure Event HubsStream to SIEM or external systemsIntegration with Sentinel, Splunk, or other SIEM tools

You can send logs to multiple destinations simultaneously — for example, Log Analytics for active querying AND a storage account for long-term archival.

ℹ️ Scenario: Priya configures diagnostic settings

🔐 Priya configures diagnostic settings for Meridian Health:

  1. Navigate to: Entra admin center → Monitoring → Diagnostic settings → Add diagnostic setting
  2. Name: “MeridianHealth-IdentityLogs”
  3. Logs to send: All four sign-in types + Audit logs + Provisioning logs
  4. Destination 1: Log Analytics workspace (“MeridianHealth-LogAnalytics”) — for KQL queries and workbooks
  5. Destination 2: Storage account (“meridianlogarchive”) — for 7-year retention (healthcare compliance)

Now all identity logs flow to both destinations. Priya can query recent events in Log Analytics and archive older logs in cheap storage.

Cost tip: Log Analytics charges per GB ingested. Sign-in logs (especially non-interactive) generate the most data. Priya monitors ingestion volumes and may exclude non-interactive sign-ins if costs are too high and they’re not needed for investigation.

💡 Exam tip: Prerequisite for diagnostic settings

To configure diagnostic settings, you need:

  • In Entra ID: Security Administrator role (Security Reader and Reports Reader can view logs but cannot create diagnostic settings)
  • In Azure: Contributor or higher on the destination resource (Log Analytics workspace, storage account, or Event Hub)
  • The Log Analytics workspace must exist before you can select it as a destination

KQL queries for identity investigation

Once logs are in Log Analytics, you can query them with KQL (Kusto Query Language). Here are practical examples:

Find failed sign-ins in the last 24 hours:

SigninLogs
| where TimeGenerated > ago(24h)
| where ResultType != "0"
| summarize FailedAttempts = count() by UserPrincipalName
| order by FailedAttempts desc

Find sign-ins from unfamiliar locations:

SigninLogs
| where TimeGenerated > ago(7d)
| where LocationDetails.countryOrRegion != "NZ"
| project TimeGenerated, UserPrincipalName, AppDisplayName, LocationDetails.city
| order by TimeGenerated desc

Find recent role assignments (who got admin roles):

AuditLogs
| where TimeGenerated > ago(7d)
| where OperationName == "Add member to role"
| project TimeGenerated, InitiatedBy.user.userPrincipalName, TargetResources[0].displayName
ℹ️ Scenario: Anika investigates suspicious sign-ins with KQL

🛡️ Anika receives an alert about unusual sign-in activity at Meridian Health. She opens Log Analytics and runs:

SigninLogs
| where TimeGenerated > ago(1h)
| where RiskLevelDuringSignIn in ("high", "medium")
| project TimeGenerated, UserPrincipalName, AppDisplayName, IPAddress, LocationDetails.city, RiskLevelDuringSignIn, Status.errorCode
| order by TimeGenerated desc

She finds 3 high-risk sign-ins from an IP in a country Meridian Health doesn’t operate in. She cross-references with the audit logs:

AuditLogs
| where TimeGenerated > ago(1h)
| where InitiatedBy.user.userPrincipalName == "compromised.user@meridianhealth.com"
| project TimeGenerated, OperationName, TargetResources

No suspicious changes found — the Conditional Access policy blocked the sign-ins. Anika documents the investigation and recommends blocking the IP range.

💡 Exam tip: KQL basics for the exam

You don’t need to be a KQL expert for SC-300, but you should know:

  • where — filters rows (like SQL WHERE)
  • project — selects columns (like SQL SELECT)
  • summarize — aggregates data (like SQL GROUP BY)
  • order by — sorts results
  • ago() — time function (e.g., ago(24h), ago(7d))
  • SigninLogs and AuditLogs are the main table names

The exam tests whether you can read a KQL query and understand what it does — not write complex queries from scratch.

Workbooks and reporting

Entra ID workbooks are pre-built and custom visual dashboards powered by Log Analytics data:

Built-in WorkbookWhat It Shows
Sign-in analysisSign-in trends, failure rates, CA policy impact
Conditional Access insightsWhich CA policies are firing, gaps in coverage
Authentication methodsMFA adoption, method types, registration status
Sensitive operationsHigh-risk admin actions, privilege escalation
Cross-tenant accessB2B sign-in activity from external tenants

To use workbooks: Entra admin center → Monitoring → Workbooks. Select a template or create custom.

Reporting options:

  • Entra admin center → Usage & insights — built-in reports (authentication methods, MFA usage)
  • Workbooks — visual dashboards from Log Analytics data
  • KQL export — export query results to CSV
  • Microsoft Sentinel — advanced SIEM with automated response (if Event Hubs are configured)

Identity Secure Score

Identity Secure Score is a percentage that measures how well your Entra ID configuration aligns with Microsoft’s security best practices.

How it works:

  • Score ranges from 0% to 100%
  • Based on improvement actions — each action has a max score impact
  • Actions are prioritised by impact and implementation effort
  • Score updates automatically as you implement recommendations

Common improvement actions:

RecommendationImpactWhat to Do
Enable MFA for all usersHighDeploy Conditional Access requiring MFA
Eliminate standing admin accessHighConvert active admin assignments to eligible in PIM
Block legacy authenticationMediumCreate CA policy blocking legacy auth protocols
Require MFA for admin rolesHighCA policy or PIM activation requiring MFA for admins
Enable password protectionMediumConfigure banned password lists
Use least-privilege admin rolesMediumReplace Global Admin with specific roles (User Admin, etc.)
ℹ️ Scenario: Priya improves Meridian Health's Secure Score

🔐 Priya checks Meridian Health’s Identity Secure Score: 62%

Top recommendations:

  1. Enable MFA for all users (+15 points) — Priya creates a CA policy requiring MFA for all users, all apps
  2. Ensure all admins use PIM (+8 points) — She converts the remaining 4 active admin assignments to eligible
  3. Block legacy authentication (+6 points) — Creates a CA policy blocking legacy auth

After implementing all three: Score rises to 85%. The remaining 15% includes actions like enabling Entra ID Password Protection (custom banned passwords) and requiring phishing-resistant MFA.

Priya schedules a monthly check of the Secure Score dashboard to catch new recommendations.

💡 Exam tip: Secure Score vs Defender Secure Score

Don’t confuse Identity Secure Score (in Entra ID — focuses on identity configuration) with Microsoft Secure Score (in Microsoft Defender — broader security posture across M365). The SC-300 exam tests Identity Secure Score specifically.

Identity Secure Score is found in the Entra admin center under Protection → Identity Secure Score (or Identity → Overview in some portal versions).

Video Lesson

🎬 Video coming soon

Identity Monitoring: Logs, KQL & Secure Score

Identity Monitoring: Logs, KQL & Secure Score

~12 min

Key Concepts

Question

What are the three types of identity logs in Entra ID?

Click or press Enter to reveal answer

Answer

1) Sign-in logs — authentication events (interactive, non-interactive, service principal, managed identity). 2) Audit logs — directory changes (user created, role assigned, policy modified). 3) Provisioning logs — user provisioning events to/from connected applications.

Click to flip back

Question

What are the three destinations for Entra ID diagnostic settings?

Click or press Enter to reveal answer

Answer

1) Log Analytics workspace — for KQL queries, workbooks, and alerts. 2) Azure Storage account — for long-term archival at low cost. 3) Azure Event Hubs — for streaming to SIEM tools like Microsoft Sentinel or Splunk. You can send to multiple destinations simultaneously.

Click to flip back

Question

What does Identity Secure Score measure?

Click or press Enter to reveal answer

Answer

Identity Secure Score is a percentage (0-100%) that measures how well your Entra ID configuration aligns with Microsoft security best practices. It provides prioritised improvement actions like enabling MFA, using PIM, and blocking legacy auth. Found in Entra admin center under Protection.

Click to flip back

Question

What KQL table contains Entra ID sign-in events?

Click or press Enter to reveal answer

Answer

SigninLogs for interactive user sign-ins. Other tables include AADNonInteractiveUserSignInLogs, AADServicePrincipalSignInLogs, and AADManagedIdentitySignInLogs. AuditLogs contains directory change events.

Click to flip back

Question

How long are Entra ID logs retained in the portal by default?

Click or press Enter to reveal answer

Answer

With Entra ID P2 (or Governance): 30 days. With Entra ID Free: 7 days. To retain longer, configure diagnostic settings to send logs to Log Analytics (queryable) or Azure Storage (archival). Many compliance frameworks require 1-7 years of log retention.

Click to flip back

Knowledge Check

Knowledge Check

Priya needs to investigate failed sign-ins that happened 45 days ago. When she checks the Entra admin center, the data isn't there. Meridian Health has Entra ID P2 licensing. What should she have configured beforehand to retain this data?

Knowledge Check

Anika needs to find all users who were assigned the Global Administrator role in the last 7 days. Which log and KQL approach should she use?

Knowledge Check

Meridian Health's Identity Secure Score is 55%. Which action would have the HIGHEST impact on improving the score?

Knowledge Check

Which KQL query would show the count of failed sign-ins per user in the last 24 hours?


Congratulations! 🎉 You’ve completed Domain 4: Plan and Automate Identity Governance. You now understand entitlement management, access reviews, PIM, and identity monitoring — the tools that keep access governed and auditable. These are heavily tested on the SC-300 exam, so review the flashcards and revisit any quiz questions you got wrong.

← Previous

PIM: Azure Resources, Groups & Audit

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.