Skip to content

Commit 0738a58

Browse files
authored
Merge pull request #109229 from MicrosoftGuyJFlo/PR108516
[Azure AD] Conditional Access - PR108516
2 parents 5566387 + 240fd8f commit 0738a58

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

articles/active-directory/conditional-access/block-legacy-authentication.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 03/25/2020
9+
ms.date: 03/26/2020
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -73,6 +73,8 @@ The following options are considered legacy authentication protocols
7373
- Reporting Web Services - Used to retrieve report data in Exchange Online.
7474
- Other clients - Other protocols identified as utilizing legacy authentication.
7575

76+
For more information about these authentication protocols and services, see [Sign-in activity reports in the Azure Active Directory portal](../reports-monitoring/concept-sign-ins.md#filter-sign-in-activities).
77+
7678
### Identify legacy authentication use
7779

7880
Before you can block legacy authentication in your directory, you need to first understand if your users have apps that use legacy authentication and how it affects your overall directory. Azure AD sign-in logs can be used to understand if you're using legacy authentication.

0 commit comments

Comments
 (0)