You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/workbook-authentication-prompts-analysis.md
+3-5Lines changed: 3 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,7 @@ This article provides you with an overview of **Authentication Prompts Analysis*
26
26
27
27
Have you recently heard of complaints from your users about getting too many authentication prompts?
28
28
29
-
Overprompting users can affect your user's productivity and often leads users getting phished for MFA. To be clear, MFA is essential! We are not talking about if you should require MFA but how frequently you should prompt your users.
29
+
Overprompting users can affect your user's productivity and often leads users getting phished for MFA. To be clear, MFA is essential! We aren't talking about if you should require MFA but how frequently you should prompt your users.
30
30
31
31
Typically, this scenario is caused by:
32
32
@@ -63,11 +63,11 @@ This workbook breaks down authentication prompts by:
63
63
64
64

65
65
66
-
In many environments, the most used apps are business productivity apps. Anything that isn’t expected should be investigated. The charts below show authentication prompts by application.
66
+
In many environments, the most used apps are business productivity apps. Anything that isn’t expected should be investigated. The following charts show authentication prompts by application.
67
67
68
68

69
69
70
-
The prompts by application list view shows additional information such as timestamps, and request IDs that help with investigations.
70
+
The **prompts by application list view** shows additional information such as timestamps, and request IDs that help with investigations.
71
71
72
72
Additionally, you get a summary of the average and median prompts count for your tenant.
73
73
@@ -98,6 +98,4 @@ Filtering for a specific user that has many authentication requests or only show
98
98
99
99
- To understand more about the different policies that affect MFA prompts, see [Optimize reauthentication prompts and understand session lifetime for Microsoft Entra multifactor authentication](../authentication/concepts-azure-multi-factor-authentication-prompts-session-lifetime.md).
100
100
101
-
- To learn more about the different vulnerabilities of different MFA methods, see [All your creds belong to us!](https://aka.ms/allyourcreds).
102
-
103
101
- To learn how to move users from telecom-based methods to the Authenticator app, see [How to run a registration campaign to set up Microsoft Authenticator - Microsoft Authenticator app](../authentication/how-to-mfa-registration-campaign.md).
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/workbook-cross-tenant-access-activity.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,7 +24,7 @@ This article provides you with an overview of the **Cross-tenant access activity
24
24
25
25

26
26
27
-
Tenant administrators who are making changes to policies governing cross-tenant access can use this workbook to visualize and review existing access activity patterns before making policy changes. For example, you can identify the apps your users are accessing in external organizations so that you don't inadvertently block critical business processes. Understanding how external users access resources in your tenant (inbound access) and how users in your tenant access resources in external tenants (outbound access) will help ensure you have the right cross-tenant policies in place.
27
+
Tenant administrators who are making changes to policies governing cross-tenant access can use this workbook to visualize and review existing access activity patterns before making policy changes. For example, you can identify the apps your users are accessing in external organizations so that you don't inadvertently block critical business processes. Understanding how external users access resources in your tenant (inbound access) and how users in your tenant access resources in external tenants (outbound access) helps ensure you have the right cross-tenant policies in place.
28
28
29
29
For more information, see the [Microsoft Entra External ID documentation](../external-identities/index.yml).
30
30
@@ -49,15 +49,15 @@ The total number of external tenants that have had cross-tenant access activity
49
49
50
50

51
51
52
-
The **External Tenant** list shows all the tenants that have had inbound or outbound activity with your tenant. When you select an external tenant in the table, the sections after the table update with information about outbound and inbound activity for that tenant.
52
+
The **External Tenant** list shows all the tenants that have had inbound or outbound activity with your tenant. When you select an external tenant in the table, the sections after the table display information about outbound and inbound activity for that tenant.
53
53
54
54

55
55
56
56
When you select an external tenant from the list with outbound activity, associated details appear in the **Outbound activity** table. The same applies when you select an external tenant with inbound activity. Select the **Inbound activity** tab to view the details of an external tenant with inbound activity.
57
57
58
58

59
59
60
-
When viewing external tenants with outbound activity, the subsequent two tables display details for the application and user activity appear. When viewing external tenants with inbound activity, the same tables show inbound application and user activity. These tables are dynamic and based on what was previously selected, so make sure you're viewing the correct tenant and activity.
60
+
When you're viewing external tenants with outbound activity, the subsequent two tables display details for the application and user activity appear. When you're viewing external tenants with inbound activity, the same tables show inbound application and user activity. These tables are dynamic and based on what was previously selected, so make sure you're viewing the correct tenant and activity.
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/workbook-legacy-authentication.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,7 +19,7 @@ ms.reviewer: besiler
19
19
20
20
Have you ever wondered how you can determine whether it's safe to turn off legacy authentication in your tenant? The sign-ins using legacy authentication workbook helps you to answer this question.
21
21
22
-
This article gives you an overview of the **Sign-ins using legacy authenticaion** workbook.
22
+
This article gives you an overview of the **Sign-ins using legacy authentication** workbook.
To improve the security of your Microsoft Entra tenant and experience of your users, you should disable legacy authentication. However, important user experiences in your tenant might depend on legacy authentication. Before shutting off legacy authentication, you may want to find those cases so you can migrate them to more secure authentication.
45
45
46
-
The sign-ins using legacy authentication workbook lets you see all legacy authentication sign-ins in your environment so you can find and migrate critical workflows to more secure authentication methods before you shut off legacy authentication.
46
+
The **Sign-ins using legacy authentication** workbook lets you see all legacy authentication sign-ins in your environment. This workbook helps you find and migrate critical workflows to more secure authentication methods before you shut off legacy authentication.
47
47
48
48
## How to access the workbook
49
49
@@ -82,7 +82,7 @@ This workbook supports multiple filters:
82
82
83
83
- Many email protocols that once relied on legacy authentication now support more secure modern authentication methods. If you see legacy email authentication protocols in this workbook, consider migrating to modern authentication for email instead. For more information, see [Deprecation of Basic authentication in Exchange Online](/exchange/clients-and-mobile-in-exchange-online/deprecation-of-basic-authentication-exchange-online).
84
84
85
-
- Some clients can use both legacy authentication or modern authentication depending on client configuration. If you see “modern mobile/desktop client” or “browser” for a client in the Microsoft Entra logs, it's using modern authentication. If it has a specific client or protocol name, such as “Exchange ActiveSync”, it's using legacy authentication to connect to Microsoft Entra ID. The client types in Conditional Access, and the Microsoft Entra reporting page in the Microsoft Entra admin center demarcate modern authentication clients and legacy authentication clients for you, and only legacy authentication is captured in this workbook.
85
+
- Some clients can use both legacy authentication or modern authentication depending on client configuration. If you see “modern mobile/desktop client” or “browser” for a client in the Microsoft Entra logs, it's using modern authentication. If it has a specific client or protocol name, such as “Exchange ActiveSync,” it's using legacy authentication to connect to Microsoft Entra ID. The client types in Conditional Access, and the Microsoft Entra reporting page in the Microsoft Entra admin center demarcate modern authentication clients and legacy authentication clients for you, and only legacy authentication is captured in this workbook.
86
86
87
87
- To learn more about identity protection, see [What is identity protection](../identity-protection/overview-identity-protection.md).
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/workbook-mfa-gaps.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,8 +17,8 @@ ms.reviewer: sarbar
17
17
18
18
# Multifactor Authentication Gaps workbook
19
19
20
-
The Multifactor Authentication Gaps workbook helps with identifying user sign-ins and applications that are not protected by multifactor authentication (MFA) requirements. This workbook:
21
-
* Identifies user sign-ins not protected by multi-factor authentication requirements.
20
+
The Multifactor Authentication Gaps workbook helps with identifying user sign-ins and applications that aren't protected by multifactor authentication (MFA) requirements. This workbook:
21
+
* Identifies user sign-ins not protected by MFA requirements.
22
22
* Provides further drill down options using various pivots such as applications, operating systems, and location.
23
23
* Provides several filters such as trusted locations and device states to narrow down the users/applications.
24
24
* Provides filters to scope the workbook for a subset of users and applications.
@@ -40,7 +40,7 @@ The **MFA gaps** workbook is currently not available as a template, but you can
40
40

41
41
1. Copy the entire JSON file from the GitHub repository.
42
42
1. Return Advanced Editor window on the Azure portal and paste the JSON file over the exiting text.
43
-
1. Select the **Apply** button. The workbook will take a few moments to populate.
43
+
1. Select the **Apply** button. The workbook may take a few moments to populate.
44
44
1. Select the **Save As** button and provide the required information.
45
45
- Provide a **Title**, **Subscription**, **Resource Group** (you must have the ability to save a workbook for the selected Resource Group), and **Location**.
46
46
- Optionally choose to save your workbook content to an [Azure Storage Account](../../azure-monitor/visualize/workbooks-bring-your-own-storage.md).
@@ -53,15 +53,15 @@ The summary widget provides a detailed look at sign-ins related to multifactor a
53
53
54
54
***Number of users signing-in not protected by multi-factor authentication requirement by application:** This widget provides a time based bar-graph representation of the number of user sign-ins not protected by MFA requirement by applications.
55
55
***Percent of users signing-in not protected by multi-factor authentication requirement by application:** This widget provides a time based bar-graph representation of the percentage of user sign-ins not protected by MFA requirement by applications.
56
-
***Select an application and user to learn more:** This widget groups the top users signed in without MFA requirement by application. By selecting the application, it will list the user names and the count of sign-ins without MFA.
56
+
***Select an application and user to learn more:** This widget groups the top users signed in without MFA requirement by application. Select the application to see a list of the user names and the count of sign-ins without MFA.
57
57
58
58
### Sign-ins not protected by MFA requirement by users
59
59
***Sign-ins not protected by multi-factor auth requirement by user:** This widget shows top user and the count of sign-ins not protected by MFA requirement.
60
-
***Top users with high percentage of authentications not protected by multi-factor authentication requirements:** This widget shows users with top percentage of authentications that are not protected by MFA requirements.
60
+
***Top users with high percentage of authentications not protected by multi-factor authentication requirements:** This widget shows users with top percentage of authentications that aren't protected by MFA requirements.
61
61
62
62
### Sign-ins not protected by MFA requirement by Operating Systems
63
-
***Number of sign-ins not protected by multi-factor authentication requirement by operating system:** This widget provides time based bar graph of sign-in counts that are not protected by MFA by operating system of the devices.
64
-
***Percent of sign-ins not protected by multi-factor authentication requirement by operating system:** This widget provides time based bar graph of sign-in percentages that are not protected by MFA by operating system of the devices.
63
+
***Number of sign-ins not protected by multi-factor authentication requirement by operating system:** This widget provides time based bar graph of sign-in counts that aren't protected by MFA by operating system of the devices.
64
+
***Percent of sign-ins not protected by multi-factor authentication requirement by operating system:** This widget provides time based bar graph of sign-in percentages that aren't protected by MFA by operating system of the devices.
65
65
66
66
### Sign-ins not protected by MFA requirement by locations
67
-
***Number of sign-ins not protected by multi-factor authentication requirement by location:** This widget shows the sign-ins counts that are not protected by MFA requirement in map bubble chart on the world map.
67
+
***Number of sign-ins not protected by multi-factor authentication requirement by location:** This widget shows the sign-ins counts that aren't protected by MFA requirement in map bubble chart on the world map.
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/workbook-risk-analysis.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -67,9 +67,9 @@ Risky Users:
67
67
68
68
## Best practices
69
69
70
-
-**[Enable risky sign-in policies](../identity-protection/concept-identity-protection-policies.md#sign-in-risk-based-conditional-access-policy)** - To prompt for multi-factor authentication (MFA) on medium risk or above. Enabling the policy reduces the proportion of active real-time risk detections by allowing legitimate users to self-remediate the risk detections with MFA.
70
+
-**[Enable risky sign-in policies](../identity-protection/concept-identity-protection-policies.md#sign-in-risk-based-conditional-access-policy)** - To prompt for multifactor authentication (MFA) on medium risk or higher. Enabling the policy reduces the proportion of active real-time risk detections by allowing legitimate users to self-remediate the risk detections with MFA.
71
71
72
-
-**[Enable a risky user policy](../identity-protection/howto-identity-protection-configure-risk-policies.md#user-risk-policy-in-conditional-access)** - To enable users to securely remediate their accounts when they're high risk. Enabling the policy reduces the number of active at-risk users in your organization by returning the user’s credentials to a safe state.
72
+
-**[Enable a risky user policy](../identity-protection/howto-identity-protection-configure-risk-policies.md#user-risk-policy-in-conditional-access)** - To enable users to securely remediate their accounts when they're considered high risk. Enabling the policy reduces the number of active at-risk users in your organization by returning the user’s credentials to a safe state.
73
73
74
74
- To learn more about identity protection, see [What is identity protection](../identity-protection/overview-identity-protection.md).
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/workbook-sensitive-operations-report.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,7 +29,7 @@ This article provides you with an overview of the **Sensitive Operations Report*
29
29
30
30
This workbook identifies recent sensitive operations that have been performed in your tenant and which may service principal compromise.
31
31
32
-
If your organization is new to Azure monitor workbooks, you need to integrate your Microsoft Entra sign-in and audit logs with Azure Monitor before accessing the workbook. This integration allows you to store, and query, and visualize your logs using workbooks for up to two years. Only sign-in and audit events created after Azure Monitor integration will be stored, so the workbook won't contain insights prior to that date. Learn more about the prerequisites to Azure Monitor workbooks for Microsoft Entra ID. If you've previously integrated your Microsoft Entra sign-in and audit logs with Azure Monitor, you can use the workbook to assess past information.
32
+
If your organization is new to Azure monitor workbooks, you need to integrate your Microsoft Entra sign-in and audit logs with Azure Monitor before accessing the workbook. This integration allows you to store, and query, and visualize your logs using workbooks for up to two years. Only sign-in and audit events created after Azure Monitor integration are stored, so the workbook won't contain insights prior to that date. Learn more about the prerequisites to Azure Monitor workbooks for Microsoft Entra ID. If you've previously integrated your Microsoft Entra sign-in and audit logs with Azure Monitor, you can use the workbook to assess past information.
33
33
34
34
## How to access the workbook
35
35
@@ -66,7 +66,7 @@ This section includes the following data to help you detect:
66
66
67
67
In cases where the attacker can't find a service principal or an application with a high privilege set of permissions through which to gain access, they'll often attempt to add the permissions to another service principal or app.
68
68
69
-
This section includes a breakdown of the AppOnly permissions grants to existing service principals. Admins should investigate any instances of excessive high permissions being granted, including, but not limited to, Exchange Online, Microsoft Graph and Azure AD Graph.
69
+
This section includes a breakdown of the AppOnly permissions grants to existing service principals. Admins should investigate any instances of excessive high permissions being granted, including, but not limited to, Exchange Online, and Microsoft Graph.
70
70
71
71
### Directory role and group membership updates for service principals
72
72
@@ -119,7 +119,7 @@ This paragraph lists the supported filters for each section.
119
119
120
120
## Best practices
121
121
122
-
-**USe modified application and service principal credentials** to look out for credentials being added to service principals that aren't frequently used in your organization. Use the filters present in this section to further investigate any of the suspicious actors or service principals that were modified.
122
+
-* Use modified application and service principal credentials** to look out for credentials being added to service principals that aren't frequently used in your organization. Use the filters present in this section to further investigate any of the suspicious actors or service principals that were modified.
123
123
124
124
-**Use new permissions granted to service principals** to look out for broad or excessive permissions being added to service principals by actors that may be compromised.
0 commit comments