Provide auditing capabilities for Point to Site VPN
The scenario prompting this ask is described here:
Thank you for your patience. This is still under review. We are working on other features that are moving us closer to being able to provide these capabilities, but cannot yet dedicate resources to this feature.
Dossy Shiobara commented
5, almost 6 years later, and this is still unresolved?
Is the expectation that people not use VPN Gateway, and instead use a VM and run OpenVPN on it?
Viktor Tadijanovic commented
Are there any updates on this feature over the past two years? Having a client VPN access is very helpful, but without a basic audit log it is hard to justify in any type of environment.
Chris Neale commented
4 years and counting. Until auditing it present on this device, it is near useless as any security team/audit will fail because you cannot retrospectively say who connected to it when!
Please can we have an update?
Jason Burton commented
has this been implemented yet?
That shouldn't be even under review! That's essential - the client gets inside a perimeter via VPN (to RDP to their VMs) and no one knows who, when, from where logged in???
any update for this ?
Steve Wiederrich commented
Just something as simple as a log that shows which certificate/user connected/disconnected at what date/time. This would go a long way to being able use Azure as a dev/test environment for corporate environments where some set of production data is typically used for these environments and corporate security wants to know who has access to data and when.