Skip to content

Commit 628b261

Browse files
committed
[AzureAD] Additional edits and revisions
1 parent b1a5a21 commit 628b261

File tree

2 files changed

+5
-5
lines changed

2 files changed

+5
-5
lines changed

articles/active-directory/authentication/howto-mfa-reporting.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,11 +15,11 @@ ms.reviewer: michmcla
1515

1616
ms.collection: M365-identity-device-management
1717
---
18-
# View the sign-ins report to review Azure Multi-Factor Authentication events
18+
# Use the sign-ins report to review Azure Multi-Factor Authentication events
1919

20-
To review and understand Azure Multi-Factor Authentication events, you can view the Azure Active Directory (Azure AD) sign-ins report. This report shows authentication details for events when a user is prompted for multi-factor authentication, and if any Conditional Access policies were in use.
20+
To review and understand Azure Multi-Factor Authentication events, you can use the Azure Active Directory (Azure AD) sign-ins report. This report shows authentication details for events when a user is prompted for multi-factor authentication, and if any Conditional Access policies were in use. For detailed information on the sign-ins report, see the [overview of sign-in activity reports in Azure AD](../reports-monitoring/concept-sign-ins.md).
2121

22-
This article shows you how to view the Azure AD sign-ins report in the Azure portal, and then the MSOnline V1 PowerShell module. For detailed information on the sign-ins report, see the [overview of sign-in activity reports in Azure AD](../reports-monitoring/concept-sign-ins.md).
22+
This article shows you how to view the Azure AD sign-ins report in the Azure portal, and then the MSOnline V1 PowerShell module.
2323

2424
## View the Azure AD sign-ins report
2525

@@ -36,7 +36,7 @@ To view the sign-in activity report in the [Azure portal](https://portal.azure.c
3636

3737
1. Sign in to the [Azure portal](https://portal.azure.com) using an account with *global administrator* permissions.
3838
1. Search for and select **Azure Active Directory**, then choose **Users** from the menu on the left-hand side.
39-
1. Under **Activity** from the menu on the left-hand side, select *Sign-ins*.
39+
1. Under *Activity* from the menu on the left-hand side, select **Sign-ins**.
4040
1. A list of sign-in events is shown, including the status. You can select an event to view more details.
4141

4242
The *Authentication Details* or *Conditional Access* tab of the event details shows you the status code or which policy triggered the MFA prompt.

articles/active-directory/authentication/howto-mfa-userstates.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -184,4 +184,4 @@ Get-MsolUser -All | Set-MfaState -State Disabled
184184

185185
To configure Azure Multi-Factor Authentication settings like trusted IPs, custom voice messages, and fraud alerts, see [Configure Azure Multi-Factor Authentication settings](howto-mfa-mfasettings.md). To manage user settings for Azure Multi-Factor Authentication, see [Manage user settings with Azure Multi-Factor Authentication](howto-mfa-userdevicesettings.md).
186186

187-
To understand why a user was prompted or not prompted to perform MFA, see [Azure Multi-Factor Authentication reports](howto-mfa-reporting.md#azure-ad-sign-ins-report).
187+
To understand why a user was prompted or not prompted to perform MFA, see [Azure Multi-Factor Authentication reports](howto-mfa-reporting.md).

0 commit comments

Comments
 (0)