Skip to content

Commit 67dcb42

Browse files
committed
revised portal steps
1 parent 770ffe4 commit 67dcb42

File tree

4 files changed

+19
-22
lines changed

4 files changed

+19
-22
lines changed

articles/active-directory/authentication/howto-mfa-reporting-datacollection.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -6,12 +6,12 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 01/07/2021
9+
ms.date: 09/13/2021
1010

1111
ms.author: justinha
1212
author: justinha
1313
manager: amycolannino
14-
ms.reviewer: michmcla
14+
ms.reviewer: jpettere
1515

1616
ms.collection: M365-identity-device-management
1717
---
@@ -149,39 +149,39 @@ From the command line of the MFA Server, run the following command changing the
149149

150150
## Gather data from NPS Extension
151151

152-
Use the [Microsoft Privacy Portal](https://portal.azure.com/#blade/Microsoft_Azure_Policy/UserPrivacyMenuBlade/Overview) to make a request for Export.
152+
Use the Microsoft Privacy portal to make a request for Export.
153153

154154
- MFA information is included in the export, which may take hours or days to complete.
155155
- Occurrences of the username in the AzureMfa/AuthN/AuthNOptCh, AzureMfa/AuthZ/AuthZAdminCh, and AzureMfa/AuthZ/AuthZOptCh event logs are considered operational and duplicative to the information provided in the export.
156156

157157
## Delete data from NPS Extension
158158

159-
Use the [Microsoft Privacy Portal](https://portal.azure.com/#blade/Microsoft_Azure_Policy/UserPrivacyMenuBlade/Overview) to make a request for Account Close to delete all MFA cloud service information collected for this user.
159+
Use the Microsoft Privacy portal to make a request for Account Close to delete all MFA cloud service information collected for this user.
160160

161161
- It may take up to 30 days for data to be fully removed.
162162

163163
## Gather data from Windows Server 2016 Azure AD MFA AD FS Adapter
164164

165-
Use the [Microsoft Privacy Portal](https://portal.azure.com/#blade/Microsoft_Azure_Policy/UserPrivacyMenuBlade/Overview) to make a request for Export.
165+
Use the Microsoft Privacy portal to make a request for Export.
166166

167167
- MFA information is included in the export, which may take hours or days to complete.
168168
- Occurrences of the username in the AD FS Tracing/Debug event logs (if enabled) are considered operational and duplicative to the information provided in the export.
169169

170170
## Delete data from Windows Server 2016 Azure AD MFA AD FS Adapter
171171

172-
Use the [Microsoft Privacy Portal](https://portal.azure.com/#blade/Microsoft_Azure_Policy/UserPrivacyMenuBlade/Overview) to make a request for Account Close to delete all MFA cloud service information collected for this user.
172+
Use the Microsoft Privacy portal to make a request for Account Close to delete all MFA cloud service information collected for this user.
173173

174174
- It may take up to 30 days for data to be fully removed.
175175

176176
## Gather data for Azure AD MFA
177177

178-
Use the [Microsoft Privacy Portal](https://portal.azure.com/#blade/Microsoft_Azure_Policy/UserPrivacyMenuBlade/Overview) to make a request for Export.
178+
Use the Microsoft Privacy portal to make a request for Export.
179179

180180
- MFA information is included in the export, which may take hours or days to complete.
181181

182182
## Delete data for Azure AD MFA
183183

184-
Use the [Microsoft Privacy Portal](https://portal.azure.com/#blade/Microsoft_Azure_Policy/UserPrivacyMenuBlade/Overview) to make a request for Account Close to delete all MFA cloud service information collected for this user.
184+
Use the Microsoft Privacy portal to make a request for Account Close to delete all MFA cloud service information collected for this user.
185185

186186
- It may take up to 30 days for data to be fully removed.
187187

articles/active-directory/authentication/howto-mfa-reporting.md

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 06/01/2023
9+
ms.date: 09/13/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -20,8 +20,6 @@ ms.custom: has-azure-ad-ps-ref
2020

2121
To review and understand Azure AD Multi-Factor Authentication events, you can use the Azure Active Directory (Azure AD) sign-ins report. This report shows authentication details for events when a user is prompted for multi-factor authentication, and if any Conditional Access policies were in use. For detailed information on the sign-ins report, see the [overview of sign-in activity reports in Azure AD](../reports-monitoring/concept-sign-ins.md).
2222

23-
This article shows you how to view the Azure AD sign-ins report in the Azure portal, and then the MSOnline V1 PowerShell module.
24-
2523
## View the Azure AD sign-ins report
2624

2725
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
@@ -36,16 +34,16 @@ The sign-ins report provides you with information about the usage of managed app
3634
- How many users are unable to complete the MFA challenge?
3735
- What are the common MFA issues end users are running into?
3836

39-
To view the sign-in activity report in the [Azure portal](https://portal.azure.com), complete the following steps. You can also query data using the [reporting API](../reports-monitoring/howto-configure-prerequisites-for-reporting-api.md).
37+
To view the sign-in activity report in the [Microsoft Entra admin center](https://entra.microsoft.com), complete the following steps. You can also query data using the [reporting API](../reports-monitoring/howto-configure-prerequisites-for-reporting-api.md).
4038

41-
1. Sign in to the [Azure portal](https://portal.azure.com) using an account with *global administrator* permissions.
42-
1. Search for and select **Azure Active Directory**, then choose **Users** from the menu on the left-hand side.
39+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
40+
1. Browse to **Identity** > then choose **Users** from the menu on the left-hand side.
4341
1. Under *Activity* from the menu on the left-hand side, select **Sign-ins**.
4442
1. A list of sign-in events is shown, including the status. You can select an event to view more details.
4543

4644
The **Conditional Access** tab of the event details shows you which policy triggered the MFA prompt.
4745

48-
[![Screenshot of example Azure Active Directory sign-ins report in the Azure portal](media/howto-mfa-reporting/sign-in-report-cropped.png)](media/howto-mfa-reporting/sign-in-report.png#lightbox)
46+
[![Screenshot of example Azure Active Directory sign-ins report](media/howto-mfa-reporting/sign-in-report-cropped.png)](media/howto-mfa-reporting/sign-in-report.png#lightbox)
4947

5048
If available, the authentication is shown, such as text message, Microsoft Authenticator app notification, or phone call.
5149

articles/active-directory/authentication/howto-mfaserver-adfs-2.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,12 +6,12 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 10/29/2022
9+
ms.date: 09/13/2023
1010

1111
ms.author: justinha
1212
author: justinha
1313
manager: amycolannino
14-
ms.reviewer: michmcla
14+
ms.reviewer: jpettere
1515

1616
ms.collection: M365-identity-device-management
1717
---

articles/active-directory/authentication/howto-mfaserver-deploy.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 08/08/2023
9+
ms.date: 09/13/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -117,9 +117,8 @@ Follow these steps to download the Azure AD Multi-Factor Authentication Server f
117117
>
118118
> Existing customers that activated MFA Server before July 1, 2019 can download the latest version, future updates, and generate activation credentials as usual. The following steps only work if you were an existing MFA Server customer.
119119
120-
1. Sign in to the [Azure portal](https://portal.azure.com) as an administrator.
121-
2. Search for and select *Azure Active Directory*. Select **Security** > **MFA**.
122-
3. Under **Manager MFA Server**, select **Server settings**.
120+
11. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Administrator](../roles/permissions-reference.md#global-administrator).
121+
1. Browse to **Protection** > **Multifactor authentication** > **Server settings**.
123122
4. Select **Download** and follow the instructions on the download page to save the installer.
124123

125124
![Download MFA Server from the Azure portal](./media/howto-mfaserver-deploy/downloadportal.png)
@@ -139,7 +138,7 @@ Now that you have downloaded the server you can install and configure it. Be sur
139138
5. Back on the page that you downloaded the server from, click the **Generate Activation Credentials** button. Copy this information into the Azure MFA Server in the boxes provided and click **Activate**.
140139

141140
> [!NOTE]
142-
> Only global administrators are able to generate activation credentials in the Azure portal.
141+
> Only global administrators are able to generate activation credentials in the Microsoft Entra admin center.
143142
144143
## Send users an email
145144

0 commit comments

Comments
 (0)