Hybrid Cloud Identity Part 4: Monitoring


At this step we have On-Premise Active Directory, integrated and federated with Azure AD using AD Connect and ADFS. We have an Exchange environment, integrated with Exchange Online. We have Multi-factor authentication for stronger security in place. What else do we need? Of course, we need to have a way to monitor that hybrid identity solution and react if something goes wrong. The best solution for that purpose is Azure AD Connect Health, which is included in Azure AD Premium. If can show the status of ADFS environment, On-Premise AD, Azure AD sync status and send notifications to administrators if alerts appear.

capture_06092016_220130_044a

Deployment of Azure AD Connect Health

To deploy and configure Azure AD Connect Health, I will use the following:

  1. Azure AD Premium license-based subscription (or EMS Bundle), purchased from CSP Partner
  2. Azure Active Directory – kotlyarenko.onmicrosoft.com, synced and federated with On-Premise Active Directory corp.kotlyarenko.com
  3. On-Premise AD has 2 sites – Spb (on-premise, with DC01) and Moscow (hosted in service provider DC, with DC02).
  4. AD FS environment includes ADFS Server (ADFS01) and ADFS Proxy (ADFSGW)
  5. Azure AD Connect is deployed on the dedicated server – ADCON01.

Check the official installation manual.

Add Azure AD Connect Health

Login to Azure Portal and click New -> Security and Identity -> Azure AD Connect Health

capture_06092016_194108_002

You will see the directory, where you have Global Administrator rights and Azure AD Premium mode activated, click Create.

capture_06092016_194148_003

Then click More Services -> Azure AD Connect Health to open Azure AD Connect Health menu. Click Quick Start and download 3 installers:

  1. Azure AD Connect Health agent for ADDS
  2. Azure AD Connect Health agent for ADFS
  3. The latest version of Azure AD Connect.

Install agent on DCs

Next step – you need to install Azure AD Connect Health agent for ADDS on every domain controller in your On-Premise AD.

capture_06092016_202359_026 capture_06092016_202438_027Configuration script will be launched after the installation. You will need to provide Azure AD Global Administrator credentials.

capture_06092016_202548_028Repeat this procedure on every domain controller.

Install agent on ADFS

Now you need to install Azure AD Connect Health agent for ADFS on every ADFS Server and ADFS Proxy.

capture_06092016_201045_017 capture_06092016_201147_020On ADFS Gateway you shouldn’t see any errors or warning:

capture_06092016_210532_040

But on ADFS Servers you probably will see a warning that ADFS Auditing is not enabled correctly:

capture_06092016_201354_022

To fix that, run this command on every ADFS Server with elevated admin credentials:

auditpol.exe /set /subcategory:”Application Generated” /failure:enable /success:enable

capture_06092016_201743_023And then open ADFS Management Console, click Edit Federation Service Properties and check Success Audits and Failure Audits.

capture_06092016_201836_024Enable Health Agents on AD Connect server

Next step maybe not required in your case. Open services.msc on your Azure AD Connect server and check if Azure AD Connect Health Sync Insights Service and Azure AD Connect Health Sync Monitoring Service presented there:

capture_06092016_230247_053If they are missing, then it means that Azure AD Connect Health Sync agent wasn’t available in Azure AD Connect yet when you’ve installed it. To solve this, download the latest installer of Azure AD Connect and run the installer. Choose Repair:

capture_06092016_203629_031After the installer will complete, choose Customize synchronisation options:

capture_06092016_204221_034

Provide Global Admin credentials and click Next next next, we don’t need to change anything here. You will see that Azure AD Connect Health agent for sync is being installed:

capture_06092016_204121_032 capture_06092016_204148_033Installation complete!

Configure Azure AD Connect Health

Return back to Azure Portal and open Azure AD Connect Health menu. You should see 3 panes – Active Directory Federation Services, Azure Active Directory Connect and Azure Active Directory Domain Services.

capture_06092016_204642_035

Click Azure Active Directory Connect -> Settings and change the switch to “On” to enable to evaluate all alerts.

In Alert menu you can configure e-mail notifications:

capture_06092016_204755_037You can also assign access (including Read-only) to Azure AD Connect Health for other users in the current Azure AD:

capture_06092016_204934_039That’s all. Enjoy the statuses of your On-Premise AD, Azure AD and ADFS and click any status if you need more details.

capture_06092016_204709_036 capture_06092016_204815_038 capture_06092016_210721_041

This post is a part of the Hybrid Cloud Identity series:
Part 1 – Integration of On-Premise AD and Azure AD using Azure AD Connect and ADFS
Part 2 – Hybrid Exchange
Part 3 – Azure Multi-factor Authentication
Part 4 – Azure AD Connect Health (you are here).

Comments (1)

  1. Hi Thanks for another Excellent contribution.

Skip to main content