Skip to main content

How to use workbooks with Global Secure Access

Workbooks combine text, log queries, metrics, and parameters into rich interactive reports. Any team member with access to the required Azure resources can create and edit workbooks. To learn more about Azure Workbooks, see Overview of Azure Workbooks.

Prerequisites

Export Global Secure Access information to Log Analytics

Global Secure Access workbooks integrate with Log Analytics. This integration allows you to monitor and analyze logs effectively. To learn more about Global Secure Access log integration with Log Analytics, see Integrate Microsoft Entra logs with Azure Monitor logs.

To learn how to send log information to Log Analytics, see Send logs to Azure Monitor.

The Global Secure Access categories are:

Log typeDiagnostic settings category
Traffic logsNetworkAccessTrafficLogs
Audit logs (Preview)AuditLogs
Enriched Microsoft 365 logs (Preview)EnrichedOffice365AuditLogs
Remote Network Health Logs (Preview)RemoteNetworkHealthLogs

alt text

Global Secure Access workbooks

In the Microsoft Entra admin center, navigate to Global Secure Access > Monitor > Workbooks to view predefined workbooks. Note that you won't see the workbooks unless logging data has been captured.

Network Traffic Insights workbook - Provides an overview of all traffic logs within your network, offering insights into data transfer, anomalies, and potential threats.

alt text

Remote Network Health workbook - Monitors the health and performance of remote networks, ensuring that all remote connections are reliable and secure.

alt text

Clients Activity and Status workbook - Offers an overview of the clients connected to your network, including their health status and activity levels.

alt text

Discovered Application Segments workbook - Identifies and categorizes application segments discovered within your network, aiding in effective monitoring and management of applications.

alt text

Enriched Microsoft 365 Logs workbook - Provides a detailed view of Microsoft 365 log data, enriched with contextual information to enhance visibility into user activities and potential security threats.

alt text