Skip to content

Commit 80a5711

Browse files
committed
reports-clarify-mfa-031723
1 parent b4aaf7d commit 80a5711

File tree

2 files changed

+11
-3
lines changed

2 files changed

+11
-3
lines changed

articles/active-directory/reports-monitoring/concept-all-sign-ins.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
2-
title: Sign-in logs (preview) in Azure Active Directory
3-
description: Conceptual information about Azure AD sign-in logs, including new features in preview.
2+
title: Sign-in logs (preview)
3+
description: Conceptual information about sign-in logs, including new features in preview.
44
services: active-directory
55
author: shlipsey3
66
manager: amycolannino
77
ms.service: active-directory
88
ms.topic: conceptual
99
ms.workload: identity
1010
ms.subservice: report-monitor
11-
ms.date: 01/12/2023
11+
ms.date: 03/17/2023
1212
ms.author: sarahlipsey
1313
ms.reviewer: besiler
1414
ms.collection: M365-identity-device-management
@@ -105,6 +105,10 @@ You can customize the list view by clicking **Columns** in the toolbar.
105105

106106
![Screenshot customize columns button.](./media/concept-all-sign-ins/sign-in-logs-columns-preview.png)
107107

108+
#### Considerations for MFA sign-ins
109+
110+
When a user signs in with MFA, several separate MFA events are actually taking place. For example, if a user takes 10 minutes to complete the MFA sign-in, additional MFA events are sent to reflect the latest status of the sign-in attempt. These sign-in events appear as one line item in the Azure AD sign-in logs. That same sign-in event in Azure Monitor, however, appears as multiple line items. These events will all have the same `correlationId`.
111+
108112
### Non-interactive user sign-ins
109113

110114
Like interactive user sign-ins, non-interactive sign-ins are done on behalf of a user. These sign-ins were performed by a client app or OS components on behalf of a user and don't require the user to provide an authentication factor. Instead, the device or client app uses a token or code to authenticate or access a resource on behalf of a user. In general, the user will perceive these sign-ins as happening in the background.

articles/active-directory/reports-monitoring/concept-sign-ins.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -159,6 +159,10 @@ When analyzing authentication details, take note of the following details:
159159
- The **Primary authentication** row isn't initially logged.
160160
- If you're unsure of a detail in the logs, gather the **Request ID** and **Correlation ID** to use for further analyzing or troubleshooting.
161161

162+
#### Considerations for MFA sign-ins
163+
164+
When a user signs in with MFA, several separate MFA events are actually taking place. For example, if a user takes 10 minutes to complete the MFA sign-in, additional MFA events are sent to reflect the latest status of the sign-in attempt. These sign-in events appear as one line item in the Azure AD sign-in logs. That same sign-in event in Azure Monitor, however, appears as multiple line items. These events will all have the same `correlationId`.
165+
162166
## Sign-in data used by other services
163167

164168
Sign-in data is used by several services in Azure to monitor risky sign-ins and provide insight into application usage.

0 commit comments

Comments
 (0)