Skip to content

Commit 1166b3b

Browse files
authored
Merge pull request #178295 from JamesTran-MSFT/patch-80
Added note
2 parents 3e0c29a + db854f6 commit 1166b3b

File tree

1 file changed

+3
-0
lines changed

1 file changed

+3
-0
lines changed

articles/active-directory/authentication/howto-password-ban-bad-on-premises-monitor.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -98,6 +98,9 @@ PasswordSetErrors : 1
9898

9999
The scope of the cmdlet's reporting may be influenced using one of the –Forest, -Domain, or –DomainController parameters. Not specifying a parameter implies –Forest.
100100

101+
> [!NOTE]
102+
> If you only install the DC agent on one DC, the Get-AzureADPasswordProtectionSummaryReport will read events only from that DC. To get events from multiple DCs, you'll need the DC agent installed on each DC.
103+
101104
The `Get-AzureADPasswordProtectionSummaryReport` cmdlet works by querying the DC agent admin event log, and then counting the total number of events that correspond to each displayed outcome category. The following table contains the mappings between each outcome and its corresponding event ID:
102105

103106
|Get-AzureADPasswordProtectionSummaryReport property |Corresponding event ID|

0 commit comments

Comments
 (0)