Hello Full Of Tradition,
Thanks for your question on the Microsoft QnA portal!
If you're referring to Azure SQL Database and suspect a severe incident—such as unauthorized access or anomalous activity—Microsoft can, under certain support scenarios (like during an active support case or security investigation), access additional diagnostic telemetry beyond what’s exposed in the portal or CLI. This may include internal logs with more granular details, including source IP addresses tied to connections or operations, especially if the activity triggered platform-level alerts or was captured by Microsoft’s internal monitoring systems.
That said, customer-accessible logs like Azure SQL Auditing, Diagnostic Settings (sent to Log Analytics, Event Hub, or Storage), and Microsoft Defender for Cloud alerts already provide rich information—including client IPs, query texts, and login events—when properly configured. If those aren’t enabled, historical visibility will be limited.
To help tailor the answer better:
- Are you currently experiencing a suspected breach or anomalous behavior in your Azure SQL Database?
- Have you already enabled Auditing or Diagnostic Settings for your database?
For reference, here’s how to configure auditing (which captures IP addresses): https://free.blessedness.top/en-us/azure/azure-sql/database/auditing-overview
And here’s how to set up diagnostic logs: https://free.blessedness.top/en-us/azure/azure-sql/database/metrics-diagnostic-telemetry-logging-streaming-export-configure
Please "Accept as Answer" if the answer provided is useful, so that you can help others in the community looking for remediation for similar issues.
Thanks
Pratyush