Skip to content

Commit 86f7660

Browse files
committed
clarification-acrolinx
1 parent 80a5711 commit 86f7660

File tree

2 files changed

+11
-11
lines changed

2 files changed

+11
-11
lines changed

articles/active-directory/reports-monitoring/concept-all-sign-ins.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.topic: conceptual
99
ms.workload: identity
1010
ms.subservice: report-monitor
11-
ms.date: 03/17/2023
11+
ms.date: 03/24/2023
1212
ms.author: sarahlipsey
1313
ms.reviewer: besiler
1414
ms.collection: M365-identity-device-management
@@ -107,11 +107,11 @@ You can customize the list view by clicking **Columns** in the toolbar.
107107

108108
#### Considerations for MFA sign-ins
109109

110-
When a user signs in with MFA, several separate MFA events are actually taking place. For example, if a user takes 10 minutes to complete the MFA sign-in, additional MFA events are sent to reflect the latest status of the sign-in attempt. These sign-in events appear as one line item in the Azure AD sign-in logs. That same sign-in event in Azure Monitor, however, appears as multiple line items. These events will all have the same `correlationId`.
110+
When a user signs in with MFA, several separate MFA events are actually taking place. For example, if a user enters the wrong validation code or doesn't respond in time, additional MFA events are sent to reflect the latest status of the sign-in attempt. These sign-in events appear as one line item in the Azure AD sign-in logs. That same sign-in event in Azure Monitor, however, appears as multiple line items. These events all have the same `correlationId`.
111111

112112
### Non-interactive user sign-ins
113113

114-
Like interactive user sign-ins, non-interactive sign-ins are done on behalf of a user. These sign-ins were performed by a client app or OS components on behalf of a user and don't require the user to provide an authentication factor. Instead, the device or client app uses a token or code to authenticate or access a resource on behalf of a user. In general, the user will perceive these sign-ins as happening in the background.
114+
Like interactive user sign-ins, non-interactive sign-ins are done on behalf of a user. These sign-ins were performed by a client app or OS components on behalf of a user and don't require the user to provide an authentication factor. Instead, the device or client app uses a token or code to authenticate or access a resource on behalf of a user. In general, the user perceives these sign-ins as happening in the background.
115115

116116
**Report size:** Large </br>
117117
**Examples:**
@@ -132,7 +132,7 @@ You can't customize the fields shown in this report.
132132

133133
To make it easier to digest the data, non-interactive sign-in events are grouped. Clients often create many non-interactive sign-ins on behalf of the same user in a short time period. The non-interactive sign-ins share the same characteristics except for the time the sign-in was attempted. For example, a client may get an access token once per hour on behalf of a user. If the state of the user or client doesn't change, the IP address, resource, and all other information is the same for each access token request. The only state that does change is the date and time of the sign-in.
134134

135-
When Azure AD logs multiple sign-ins that are identical other than time and date, those sign-ins will be from the same entity and are aggregated into a single row. A row with multiple identical sign-ins (except for date and time issued) will have a value greater than 1 in the *# sign-ins* column. These aggregated sign-ins may also appear to have the same time stamps. The **Time aggregate** filter can set to 1 hour, 6 hours, or 24 hours. You can expand the row to see all the different sign-ins and their different time stamps.
135+
When Azure AD logs multiple sign-ins that are identical other than time and date, those sign-ins are from the same entity and are aggregated into a single row. A row with multiple identical sign-ins (except for date and time issued) have a value greater than 1 in the *# sign-ins* column. These aggregated sign-ins may also appear to have the same time stamps. The **Time aggregate** filter can set to 1 hour, 6 hours, or 24 hours. You can expand the row to see all the different sign-ins and their different time stamps.
136136

137137
Sign-ins are aggregated in the non-interactive users when the following data matches:
138138

@@ -146,7 +146,7 @@ The IP address of non-interactive sign-ins doesn't match the actual source IP of
146146

147147
### Service principal sign-ins
148148

149-
Unlike interactive and non-interactive user sign-ins, service principal sign-ins don't involve a user. Instead, they're sign-ins by any non-user account, such as apps or service principals (except managed identity sign-in, which are in included only in the managed identity sign-in log). In these sign-ins, the app or service provides its own credential, such as a certificate or app secret to authenticate or access resources.
149+
Unlike interactive and non-interactive user sign-ins, service principal sign-ins don't involve a user. Instead, they're sign-ins by any nonuser account, such as apps or service principals (except managed identity sign-in, which are in included only in the managed identity sign-in log). In these sign-ins, the app or service provides its own credential, such as a certificate or app secret to authenticate or access resources.
150150

151151

152152
**Report size:** Large </br>
@@ -191,7 +191,7 @@ Select the **Add filters** option from the top of the table to get started.
191191

192192
![Screenshot of the sign-in logs page with the Add filters option highlighted.](./media/concept-all-sign-ins/sign-in-logs-filter-preview.png)
193193

194-
There are several filter options to choose from. Below are some notable options and details.
194+
There are several filter options to choose from:
195195

196196
- **User:** The *user principal name* (UPN) of the user in question.
197197
- **Status:** Options are *Success*, *Failure*, and *Interrupted*.

articles/active-directory/reports-monitoring/concept-sign-ins.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.topic: conceptual
99
ms.workload: identity
1010
ms.subservice: report-monitor
11-
ms.date: 01/12/2023
11+
ms.date: 03/24/2023
1212
ms.author: sarahlipsey
1313
ms.reviewer: besiler
1414
ms.collection: M365-identity-device-management
@@ -81,7 +81,7 @@ Select the **Add filters** option from the top of the table to get started.
8181

8282
![Screenshot of the sign-in logs page with the Add filters option highlighted.](./media/concept-sign-ins/sign-in-logs-filter.png)
8383

84-
There are several filter options to choose from. Below are some notable options and details.
84+
There are several filter options to choose from:
8585

8686
- **User:** The *user principal name* (UPN) of the user in question.
8787
- **Status:** Options are *Success*, *Failure*, and *Interrupted*.
@@ -90,7 +90,7 @@ There are several filter options to choose from. Below are some notable options
9090
- *Not applied:* No policy applied to the user and application during sign-in.
9191
- *Success:* One or more CA policies applied to the user and application (but not necessarily the other conditions) during sign-in.
9292
- *Failure:* The sign-in satisfied the user and application condition of at least one CA policy and grant controls are either not satisfied or set to block access.
93-
- **IP addresses:** There is no definitive connection between an IP address and where the computer with that address is physically located. Mobile providers and VPNs issue IP addresses from central pools that are often far from where the client device is actually used. Currently, converting IP address to a physical location is a best effort based on traces, registry data, reverse lookups and other information.
93+
- **IP addresses:** There's no definitive connection between an IP address and where the computer with that address is physically located. Mobile providers and VPNs issue IP addresses from central pools that are often far from where the client device is actually used. Currently, converting IP address to a physical location is a best effort based on traces, registry data, reverse lookups and other information.
9494

9595
The following table provides the options and descriptions for the **Client app** filter option.
9696

@@ -122,7 +122,7 @@ Now that your sign-in logs table is formatted appropriately, you can more effect
122122

123123
### Sign-in error codes
124124

125-
If a sign-in failed, you can get more information about the reason in the **Basic info** section of the related log item. The error code and associated failure reason appear in the details. Because of the complexity of some Azure AD environments, we cannot document every possible error code and resolution. Some errors may require [submitting a support request](../fundamentals/how-to-get-support.md) to resolve the issue.
125+
If a sign-in failed, you can get more information about the reason in the **Basic info** section of the related log item. The error code and associated failure reason appear in the details. Because of the complexity of some Azure AD environments, we can't document every possible error code and resolution. Some errors may require [submitting a support request](../fundamentals/how-to-get-support.md) to resolve the issue.
126126

127127
![Screenshot of a sign-in error code.](./media/concept-sign-ins/error-code.png)
128128

@@ -161,7 +161,7 @@ When analyzing authentication details, take note of the following details:
161161

162162
#### Considerations for MFA sign-ins
163163

164-
When a user signs in with MFA, several separate MFA events are actually taking place. For example, if a user takes 10 minutes to complete the MFA sign-in, additional MFA events are sent to reflect the latest status of the sign-in attempt. These sign-in events appear as one line item in the Azure AD sign-in logs. That same sign-in event in Azure Monitor, however, appears as multiple line items. These events will all have the same `correlationId`.
164+
When a user signs in with MFA, several separate MFA events are actually taking place. For example, if a user enters the wrong validation code or doesn't respond in time, additional MFA events are sent to reflect the latest status of the sign-in attempt. These sign-in events appear as one line item in the Azure AD sign-in logs. That same sign-in event in Azure Monitor, however, appears as multiple line items. These events all have the same `correlationId`.
165165

166166
## Sign-in data used by other services
167167

0 commit comments

Comments
 (0)