You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -24,7 +24,7 @@ This article shows you how to view the Azure AD sign-ins report in the Azure por
24
24
25
25
## View the Azure AD sign-ins report
26
26
27
-
The sign-ins report provides you with information about the usage of managed applications and user sign-in activities, which includes information about multi-factor authentication (MFA) usage. The MFA data gives you insights into how MFA is working in your organization. It lets you answer questions like the following:
27
+
The sign-ins report provides you with information about the usage of managed applications and user sign-in activities, which includes information about multi-factor authentication (MFA) usage. The MFA data gives you insights into how MFA is working in your organization. It answers questions like:
28
28
29
29
- Was the sign-in challenged with MFA?
30
30
- How did the user complete MFA?
@@ -59,7 +59,7 @@ This information allows admins to troubleshoot each step in a user’s sign-in,
59
59
- Volume of sign-ins protected by multi-factor authentication
60
60
- Usage and success rates for each authentication method
61
61
- Usage of passwordless authentication methods (such as Passwordless Phone Sign-in, FIDO2, and Windows Hello for Business)
62
-
- How frequently authentication requirements are satisfied by token claims (where users are not interactively prompted to enter a password, enter an SMS OTP, and so on)
62
+
- How frequently authentication requirements are satisfied by token claims (where users aren't interactively prompted to enter a password, enter an SMS OTP, and so on)
63
63
64
64
While viewing the sign-ins report, select the **Authentication Details** tab:
65
65
@@ -71,7 +71,7 @@ While viewing the sign-ins report, select the **Authentication Details** tab:
71
71
>[!IMPORTANT]
72
72
>The **Authentication details** tab can initially show incomplete or inaccurate data, until log information is fully aggregated. Known examples include:
73
73
>- A **satisfied by claim in the token** message is incorrectly displayed when sign-in events are initially logged.
74
-
>- The **Primary authentication** row is not initially logged.
74
+
>- The **Primary authentication** row isn't initially logged.
75
75
76
76
The following details are shown on the **Authentication Details** window for a sign-in event that show if the MFA request was satisfied or denied:
77
77
@@ -103,8 +103,8 @@ The following details are shown on the **Authentication Details** window for a s
103
103
* unable to send the mobile app notification to the device
104
104
* unable to send the mobile app notification
105
105
* user declined the authentication
106
-
* user did not respond to mobile app notification
107
-
* user does not have any verification methods registered
106
+
* user didn't respond to mobile app notification
107
+
* user doesn't have any verification methods registered
108
108
* user entered incorrect code
109
109
* user entered incorrect PIN
110
110
* user hung up the phone call without succeeding the authentication
@@ -117,13 +117,13 @@ The following details are shown on the **Authentication Details** window for a s
117
117
118
118
First, ensure that you have the [MSOnline V1 PowerShell module](/powershell/azure/active-directory/overview) installed.
119
119
120
-
Identify users who have registered for MFA using the PowerShell that follows. This set of commands excludes disabled users since these accounts cannot authenticate against Azure AD:
120
+
Identify users who have registered for MFA using the PowerShell that follows. This set of commands excludes disabled users since these accounts can't authenticate against Azure AD:
Identify users who have not registered for MFA using the PowerShell that follows. This set of commands excludes disabled users since these accounts cannot authenticate against Azure AD:
126
+
Identify users who aren't registered for MFA by running the following PowerShell commands. This set of commands excludes disabled users since these accounts can't authenticate against Azure AD:
@@ -143,10 +143,23 @@ The following additional information and reports are available for MFA events, i
143
143
| Report | Location | Description |
144
144
|:--- |:--- |:--- |
145
145
| Blocked User History | Azure AD > Security > MFA > Block/unblock users | Shows the history of requests to block or unblock users. |
146
-
| Usage for on-premises components | Azure AD > Security > MFA > Activity Report | Provides information on overall usage for MFA Server through the NPS extension, ADFS, and MFA Server. |
146
+
| Usage for on-premises components | Azure AD > Security > MFA > Activity Report | Provides information on overall usage for MFA Server through the NPS extension, AD FS, and MFA Server. |
147
147
| Bypassed User History | Azure AD > Security > MFA > One-time bypass | Provides a history of MFA Server requests to bypass MFA for a user. |
148
148
| Server status | Azure AD > Security > MFA > Server status | Displays the status of MFA Servers associated with your account. |
149
149
150
+
Cloud MFA sign-in events from an on-premises AD FS adapter or NPS extension won't have all fields in the sign-in logs populated due to limited data returned by the on-premises component. You can identify these events by the resourceID _adfs_ or _radius_ in the event properties. They include:
0 commit comments