Skip to content

Commit 7326989

Browse files
authored
Merge pull request #248527 from shlipsey3/reports-081623
reports-081623
2 parents 79deae1 + 94da006 commit 7326989

File tree

59 files changed

+430
-620
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

59 files changed

+430
-620
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5270,6 +5270,21 @@
52705270
"redirect_url": "/azure/active-directory/fundamentals/concept-fundamentals-security-defaults",
52715271
"redirect_document_id": true
52725272
},
5273+
{
5274+
"source_path_from_root": "/articles/active-directory/reports-monitoring/quickstart-filter-audit-log.md",
5275+
"redirect_url": "/azure/active-directory/reports-monitoring/howto-customize-filter-logs",
5276+
"redirect_document_id": true
5277+
},
5278+
{
5279+
"source_path_from_root": "/articles/active-directory/reports-monitoring/reference-basic-info-sign-in-logs.md",
5280+
"redirect_url": "/azure/active-directory/reports-monitoring/concept-sign-in-log-activity-details",
5281+
"redirect_document_id": true
5282+
},
5283+
{
5284+
"source_path_from_root": "/articles/active-directory/reports-monitoring/concept-all-sign-ins.md",
5285+
"redirect_url": "/azure/active-directory/reports-monitoring/concept-sign-ins",
5286+
"redirect_document_id": true
5287+
},
52735288
{
52745289
"source_path_from_root": "/articles/active-directory/reports-monitoring/howto-use-azure-monitor-workbooks.md",
52755290
"redirect_url": "/azure/active-directory/reports-monitoring/howto-use-workbooks",

articles/active-directory/authentication/concepts-azure-multi-factor-authentication-prompts-session-lifetime.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: active-directory
77
ms.subservice: authentication
88
ms.custom: has-azure-ad-ps-ref
99
ms.topic: conceptual
10-
ms.date: 08/15/2023
10+
ms.date: 08/22/2023
1111

1212
ms.author: justinha
1313
author: justinha
@@ -46,7 +46,7 @@ To optimize the frequency of authentication prompts for your users, you can conf
4646

4747
### Evaluate session lifetime policies
4848

49-
Without any session lifetime settings, there are no persistent cookies in the browser session. Every time a user closes and open the browser, they get a prompt for reauthentication. In Office clients, the default time period is a rolling window of 90 days. With this default Office configuration, if the user has reset their password or there has been inactivity of over 90 days, the user is required to reauthenticate with all required factors (first and second factor).
49+
Without any session lifetime settings, there are no persistent cookies in the browser session. Every time a user closes and opens the browser, they get a prompt for reauthentication. In Office clients, the default time period is a rolling window of 90 days. With this default Office configuration, if the user has reset their password or there has been inactivity of over 90 days, the user is required to reauthenticate with all required factors (first and second factor).
5050

5151
A user might see multiple MFA prompts on a device that doesn't have an identity in Azure AD. Multiple prompts result when each application has its own OAuth Refresh Token that isn't shared with other client apps. In this scenario, MFA prompts multiple times as each application requests an OAuth Refresh Token to be validated with MFA.
5252

@@ -99,7 +99,7 @@ This setting allows configuration of lifetime for token issued by Azure Active D
9999

100100
Now that you understand how different settings works and the recommended configuration, it's time to check your tenants. You can start by looking at the sign-in logs to understand which session lifetime policies were applied during sign-in.
101101

102-
Under each sign-in log, go to the **Authentication Details** tab and explore **Session Lifetime Policies Applied**. For more information, see [Authentication details](../reports-monitoring/concept-sign-ins.md#authentication-details).
102+
Under each sign-in log, go to the **Authentication Details** tab and explore **Session Lifetime Policies Applied**. For more information, see [Authentication details](../reports-monitoring/concept-sign-in-log-activity-details.md#authentication-details).
103103

104104
![Screenshot of authentication details.](./media/concepts-azure-multi-factor-authentication-prompts-session-lifetime/details.png)
105105

articles/active-directory/authentication/how-to-authentication-find-coverage-gaps.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ There are different ways to check if your admins are covered by an MFA policy.
2929

3030
![Screenshot of the sign-in log.](./media/how-to-authentication-find-coverage-gaps/auth-requirement.png)
3131

32-
Click **Authentication details** for [details about the MFA requirements](../reports-monitoring/concept-sign-ins.md#authentication-details).
32+
When viewing the details of a specific sign-in, select the **Authentication details** tab for details about the MFA requirements. For more information, see [Sign-in log activity details](../reports-monitoring/concept-sign-in-log-activity-details.md).
3333

3434
![Screenshot of the authentication activity details.](./media/how-to-authentication-find-coverage-gaps/details.png)
3535

articles/active-directory/conditional-access/block-legacy-authentication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ The following messaging protocols support legacy authentication:
7474
- Universal Outlook - Used by the Mail and Calendar app for Windows 10.
7575
- Other clients - Other protocols identified as utilizing legacy authentication.
7676

77-
For more information about these authentication protocols and services, see [Sign-in activity reports](../reports-monitoring/concept-sign-ins.md#filter-sign-in-activities).
77+
For more information about these authentication protocols and services, see [Sign-in log activity details](../reports-monitoring/concept-sign-in-log-activity-details.md).
7878

7979
### Identify legacy authentication use
8080

0 commit comments

Comments
 (0)