1 Answers
A:
If you want to export Microsoft Dynamics 365 logs to your SIEM (like Splunk, Sentinel, or ELK) securely and with least-privilege access, the key is to avoid giving Dynamics or your SIEM unnecessary permissions. The clean way to do it is to pull logs through Microsoft’s Dataverse or Power Platform APIs using a dedicated service principal that only has read access to audit and telemetry data. You can enable Audit Logging in Dynamics 365 (under Settings - Auditing - Global Audit Settings) and configure it to push events into the Microsoft 365 Unified Audit Log, which you can then collect via the Office 365 Management Activity API or Microsoft Graph API.
Use Azure Event Hub or a log forwarder as a bridge from there; Dynamics never makes direct contact with the SIEM, but your SIEM ingests data from Event Hub. Because the service principal only needs AuditLog, this configuration allows you to tightly scope permissions.Go ahead and read.ActivityFeed or all.Your Event Hub or forwarder employs a write-only key for ingestion, and it can read (based on the API). To lower risk exposure, only filter event types you truly need (such as security, user activity, or system faults) and always redact PII fields such contact names, emails, or customer IDs before exporting.
Find the Best Poultry ERP
Explore all products with features, pricing, reviews and more
View All SoftwareHelp the community
Be the First to Answer these questions
Disclaimer
Techjockey’s software industry experts offer advice for educational and informational purposes only. A category or product query or issue posted, created, or compiled by Techjockey is not meant to replace your independent judgment.
20,000+ Software Listed
Best
Price Guaranteed
Free Expert
Consultation
2M+
Happy Customers