Skip to content

Commit 8310e69

Browse files
Merge pull request #213571 from Justinha/nps-2
added info about events for NPS and AD FS
2 parents 252d3ec + 4a06317 commit 8310e69

File tree

1 file changed

+22
-9
lines changed

1 file changed

+22
-9
lines changed

articles/active-directory/authentication/howto-mfa-reporting.md

Lines changed: 22 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 06/20/2022
9+
ms.date: 10/04/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -24,7 +24,7 @@ This article shows you how to view the Azure AD sign-ins report in the Azure por
2424

2525
## View the Azure AD sign-ins report
2626

27-
The sign-ins report provides you with information about the usage of managed applications and user sign-in activities, which includes information about multi-factor authentication (MFA) usage. The MFA data gives you insights into how MFA is working in your organization. It lets you answer questions like the following:
27+
The sign-ins report provides you with information about the usage of managed applications and user sign-in activities, which includes information about multi-factor authentication (MFA) usage. The MFA data gives you insights into how MFA is working in your organization. It answers questions like:
2828

2929
- Was the sign-in challenged with MFA?
3030
- How did the user complete MFA?
@@ -59,7 +59,7 @@ This information allows admins to troubleshoot each step in a user’s sign-in,
5959
- Volume of sign-ins protected by multi-factor authentication
6060
- Usage and success rates for each authentication method
6161
- Usage of passwordless authentication methods (such as Passwordless Phone Sign-in, FIDO2, and Windows Hello for Business)
62-
- How frequently authentication requirements are satisfied by token claims (where users are not interactively prompted to enter a password, enter an SMS OTP, and so on)
62+
- How frequently authentication requirements are satisfied by token claims (where users aren't interactively prompted to enter a password, enter an SMS OTP, and so on)
6363

6464
While viewing the sign-ins report, select the **Authentication Details** tab:
6565

@@ -71,7 +71,7 @@ While viewing the sign-ins report, select the **Authentication Details** tab:
7171
>[!IMPORTANT]
7272
>The **Authentication details** tab can initially show incomplete or inaccurate data, until log information is fully aggregated. Known examples include:
7373
>- A **satisfied by claim in the token** message is incorrectly displayed when sign-in events are initially logged.
74-
>- The **Primary authentication** row is not initially logged.
74+
>- The **Primary authentication** row isn't initially logged.
7575
7676
The following details are shown on the **Authentication Details** window for a sign-in event that show if the MFA request was satisfied or denied:
7777

@@ -103,8 +103,8 @@ The following details are shown on the **Authentication Details** window for a s
103103
* unable to send the mobile app notification to the device
104104
* unable to send the mobile app notification
105105
* user declined the authentication
106-
* user did not respond to mobile app notification
107-
* user does not have any verification methods registered
106+
* user didn't respond to mobile app notification
107+
* user doesn't have any verification methods registered
108108
* user entered incorrect code
109109
* user entered incorrect PIN
110110
* user hung up the phone call without succeeding the authentication
@@ -117,13 +117,13 @@ The following details are shown on the **Authentication Details** window for a s
117117

118118
First, ensure that you have the [MSOnline V1 PowerShell module](/powershell/azure/active-directory/overview) installed.
119119

120-
Identify users who have registered for MFA using the PowerShell that follows. This set of commands excludes disabled users since these accounts cannot authenticate against Azure AD:
120+
Identify users who have registered for MFA using the PowerShell that follows. This set of commands excludes disabled users since these accounts can't authenticate against Azure AD:
121121

122122
```powershell
123123
Get-MsolUser -All | Where-Object {$_.StrongAuthenticationMethods -ne $null -and $_.BlockCredential -eq $False} | Select-Object -Property UserPrincipalName
124124
```
125125

126-
Identify users who have not registered for MFA using the PowerShell that follows. This set of commands excludes disabled users since these accounts cannot authenticate against Azure AD:
126+
Identify users who aren't registered for MFA by running the following PowerShell commands. This set of commands excludes disabled users since these accounts can't authenticate against Azure AD:
127127

128128
```powershell
129129
Get-MsolUser -All | Where-Object {$_.StrongAuthenticationMethods.Count -eq 0 -and $_.BlockCredential -eq $False} | Select-Object -Property UserPrincipalName
@@ -143,10 +143,23 @@ The following additional information and reports are available for MFA events, i
143143
| Report | Location | Description |
144144
|:--- |:--- |:--- |
145145
| Blocked User History | Azure AD > Security > MFA > Block/unblock users | Shows the history of requests to block or unblock users. |
146-
| Usage for on-premises components | Azure AD > Security > MFA > Activity Report | Provides information on overall usage for MFA Server through the NPS extension, ADFS, and MFA Server. |
146+
| Usage for on-premises components | Azure AD > Security > MFA > Activity Report | Provides information on overall usage for MFA Server through the NPS extension, AD FS, and MFA Server. |
147147
| Bypassed User History | Azure AD > Security > MFA > One-time bypass | Provides a history of MFA Server requests to bypass MFA for a user. |
148148
| Server status | Azure AD > Security > MFA > Server status | Displays the status of MFA Servers associated with your account. |
149149

150+
Cloud MFA sign-in events from an on-premises AD FS adapter or NPS extension won't have all fields in the sign-in logs populated due to limited data returned by the on-premises component. You can identify these events by the resourceID _adfs_ or _radius_ in the event properties. They include:
151+
- resultSignature
152+
- appID
153+
- deviceDetail
154+
- conditionalAccessStatus
155+
- authenticationContext
156+
- isInteractive
157+
- tokenIssuerName
158+
- riskDetail, riskLevelAggregated,riskLevelDuringSignIn, riskState,riskEventTypes, riskEventTypes_v2
159+
- authenticationProtocol
160+
- incomingTokenType
161+
162+
Organizations that run the latest version of NPS extension or use Azure AD Connect Health will have location IP address in events.
150163

151164
## Next steps
152165

0 commit comments

Comments
 (0)