You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -149,39 +149,39 @@ From the command line of the MFA Server, run the following command changing the
149
149
150
150
## Gather data from NPS Extension
151
151
152
-
Use the [Microsoft Privacy Portal](https://portal.azure.com/#blade/Microsoft_Azure_Policy/UserPrivacyMenuBlade/Overview) to make a request for Export.
152
+
Use the Microsoft Privacy portal to make a request for Export.
153
153
154
154
- MFA information is included in the export, which may take hours or days to complete.
155
155
- Occurrences of the username in the AzureMfa/AuthN/AuthNOptCh, AzureMfa/AuthZ/AuthZAdminCh, and AzureMfa/AuthZ/AuthZOptCh event logs are considered operational and duplicative to the information provided in the export.
156
156
157
157
## Delete data from NPS Extension
158
158
159
-
Use the [Microsoft Privacy Portal](https://portal.azure.com/#blade/Microsoft_Azure_Policy/UserPrivacyMenuBlade/Overview) to make a request for Account Close to delete all MFA cloud service information collected for this user.
159
+
Use the Microsoft Privacy portal to make a request for Account Close to delete all MFA cloud service information collected for this user.
160
160
161
161
- It may take up to 30 days for data to be fully removed.
162
162
163
163
## Gather data from Windows Server 2016 Azure AD MFA AD FS Adapter
164
164
165
-
Use the [Microsoft Privacy Portal](https://portal.azure.com/#blade/Microsoft_Azure_Policy/UserPrivacyMenuBlade/Overview) to make a request for Export.
165
+
Use the Microsoft Privacy portal to make a request for Export.
166
166
167
167
- MFA information is included in the export, which may take hours or days to complete.
168
168
- Occurrences of the username in the AD FS Tracing/Debug event logs (if enabled) are considered operational and duplicative to the information provided in the export.
169
169
170
170
## Delete data from Windows Server 2016 Azure AD MFA AD FS Adapter
171
171
172
-
Use the [Microsoft Privacy Portal](https://portal.azure.com/#blade/Microsoft_Azure_Policy/UserPrivacyMenuBlade/Overview) to make a request for Account Close to delete all MFA cloud service information collected for this user.
172
+
Use the Microsoft Privacy portal to make a request for Account Close to delete all MFA cloud service information collected for this user.
173
173
174
174
- It may take up to 30 days for data to be fully removed.
175
175
176
176
## Gather data for Azure AD MFA
177
177
178
-
Use the [Microsoft Privacy Portal](https://portal.azure.com/#blade/Microsoft_Azure_Policy/UserPrivacyMenuBlade/Overview) to make a request for Export.
178
+
Use the Microsoft Privacy portal to make a request for Export.
179
179
180
180
- MFA information is included in the export, which may take hours or days to complete.
181
181
182
182
## Delete data for Azure AD MFA
183
183
184
-
Use the [Microsoft Privacy Portal](https://portal.azure.com/#blade/Microsoft_Azure_Policy/UserPrivacyMenuBlade/Overview) to make a request for Account Close to delete all MFA cloud service information collected for this user.
184
+
Use the Microsoft Privacy portal to make a request for Account Close to delete all MFA cloud service information collected for this user.
185
185
186
186
- It may take up to 30 days for data to be fully removed.
To review and understand Azure AD Multi-Factor Authentication events, you can use the Azure Active Directory (Azure AD) sign-ins report. This report shows authentication details for events when a user is prompted for multi-factor authentication, and if any Conditional Access policies were in use. For detailed information on the sign-ins report, see the [overview of sign-in activity reports in Azure AD](../reports-monitoring/concept-sign-ins.md).
22
22
23
-
This article shows you how to view the Azure AD sign-ins report in the Azure portal, and then the MSOnline V1 PowerShell module.
@@ -36,16 +34,16 @@ The sign-ins report provides you with information about the usage of managed app
36
34
- How many users are unable to complete the MFA challenge?
37
35
- What are the common MFA issues end users are running into?
38
36
39
-
To view the sign-in activity report in the [Azure portal](https://portal.azure.com), complete the following steps. You can also query data using the [reporting API](../reports-monitoring/howto-configure-prerequisites-for-reporting-api.md).
37
+
To view the sign-in activity report in the [Microsoft Entra admin center](https://entra.microsoft.com), complete the following steps. You can also query data using the [reporting API](../reports-monitoring/howto-configure-prerequisites-for-reporting-api.md).
40
38
41
-
1. Sign in to the [Azure portal](https://portal.azure.com)using an account with *global administrator*permissions.
42
-
1.Search for and select **Azure Active Directory**, then choose **Users** from the menu on the left-hand side.
39
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com)as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
40
+
1.Browse to **Identity** > then choose **Users** from the menu on the left-hand side.
43
41
1. Under *Activity* from the menu on the left-hand side, select **Sign-ins**.
44
42
1. A list of sign-in events is shown, including the status. You can select an event to view more details.
45
43
46
44
The **Conditional Access** tab of the event details shows you which policy triggered the MFA prompt.
47
45
48
-
[](media/howto-mfa-reporting/sign-in-report.png#lightbox)
46
+
[](media/howto-mfa-reporting/sign-in-report.png#lightbox)
49
47
50
48
If available, the authentication is shown, such as text message, Microsoft Authenticator app notification, or phone call.
@@ -117,9 +117,8 @@ Follow these steps to download the Azure AD Multi-Factor Authentication Server f
117
117
>
118
118
> Existing customers that activated MFA Server before July 1, 2019 can download the latest version, future updates, and generate activation credentials as usual. The following steps only work if you were an existing MFA Server customer.
119
119
120
-
1. Sign in to the [Azure portal](https://portal.azure.com) as an administrator.
121
-
2. Search for and select *Azure Active Directory*. Select **Security** > **MFA**.
122
-
3. Under **Manager MFA Server**, select **Server settings**.
120
+
11. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Administrator](../roles/permissions-reference.md#global-administrator).
121
+
1. Browse to **Protection** > **Multifactor authentication** > **Server settings**.
123
122
4. Select **Download** and follow the instructions on the download page to save the installer.
124
123
125
124

@@ -139,7 +138,7 @@ Now that you have downloaded the server you can install and configure it. Be sur
139
138
5. Back on the page that you downloaded the server from, click the **Generate Activation Credentials** button. Copy this information into the Azure MFA Server in the boxes provided and click **Activate**.
140
139
141
140
> [!NOTE]
142
-
> Only global administrators are able to generate activation credentials in the Azure portal.
141
+
> Only global administrators are able to generate activation credentials in the Microsoft Entra admin center.
0 commit comments