Skip to content

Commit 940aee0

Browse files
committed
added view section
1 parent 8578797 commit 940aee0

File tree

1 file changed

+9
-6
lines changed

1 file changed

+9
-6
lines changed

articles/active-directory/authentication/howto-mfa-mfasettings.md

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -84,18 +84,21 @@ Users who report an MFA prompt as suspicious are set to **High User Risk**. Admi
8484

8585
To enable **Report Suspicious Activity** from the Authentication Methods Settings:
8686

87-
1. In the Azure portal, click **Azure AD** > **Security** > **Authentication Methods** > **Settings**.
87+
1. In the Azure portal, click **Azure Active Directory** > **Security** > **Authentication Methods** > **Settings**.
8888
1. Set **Report Suspicious Activity** to **Enabled**.
8989
1. Select **All users** or a specific group.
9090

91-
### View fraud reports
91+
### View suspicious activity events
9292

93-
When a user reports fraud, the event shows up in the Sign-ins report (as a sign-in that was rejected by the user) and in the Audit logs.
93+
When a user reports a MFA prompt as suspicious, the event shows up in the Sign-ins report (as a sign-in that was rejected by the user), in the Audit logs, and in the Risk detections report.
94+
95+
- To view the risk detections report, select **Azure Active Directory** > **Security** > **Identity Protection** > **Risk detection**. The risk event is part of the standard **Risk Detections** report, and will appear as Detection Type **User Reported Suspicious Activity**, Risk level **High**, Source **End user reported**.
96+
97+
- To view fraud reports in the Sign-ins report, select **Azure Active Directory** > **Sign-in logs** > **Authentication Details**. The fraud report is part of the standard **Azure AD Sign-ins** report and appears in the Result Detail as MFA denied, Fraud Code Entered.
98+
99+
- To view fraud reports in the Audit logs, select **Azure Active Directory** > **Audit logs**. The fraud report appears under Activity type Fraud reported - user is blocked for MFA or Fraud reported - no action taken based on the tenant-level settings for fraud report.
94100

95-
- To view fraud reports in the Sign-ins report, select **Azure Active Directory** > **Sign-in logs** > **Authentication Details**. The fraud report is part of the standard Azure AD Sign-ins report and appears in the **Result Detail** as **MFA denied, Fraud Code Entered**.
96101

97-
- To view fraud reports in the Audit logs, select **Azure Active Directory** > **Audit logs**. The fraud report appears under Activity type **Fraud reported - user is blocked for MFA** or **Fraud reported - no action taken** based on the tenant-level settings for fraud report.
98-
99102
## Notifications
100103

101104
You can configure Azure AD to send email notifications when users report fraud alerts. These notifications are typically sent to identity administrators, because the user's account credentials are likely compromised. The following example shows what a fraud alert notification email looks like:

0 commit comments

Comments
 (0)