Skip to content

Commit 9771e25

Browse files
Merge pull request #223835 from shlipsey3/reports-issue-cleanup-011223
reports-issue-cleanup-011223
2 parents c87044e + 7c241d2 commit 9771e25

File tree

8 files changed

+17
-16
lines changed

8 files changed

+17
-16
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4371,6 +4371,11 @@
43714371
"redirect_url": "/azure/active-directory/reports-monitoring/reports-faq",
43724372
"redirect_document_id": false
43734373
},
4374+
{
4375+
"source_path_from_root": "/articles/active-directory/reports-monitoring/workbook-legacy authentication.md",
4376+
"redirect_url": "/azure/active-directory/reports-monitoring/workbook-legacy-authentication",
4377+
"redirect_document_id": false
4378+
},
43744379
{
43754380
"source_path_from_root": "/articles/active-directory/reports-monitoring/troubleshoot-missing-audit-data.md",
43764381
"redirect_url": "/azure/active-directory/reports-monitoring/reports-faq",

articles/active-directory/authentication/howto-authentication-methods-activity.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 07/13/2021
9+
ms.date: 01/12/2023
1010

1111
ms.author: justinha
1212
author: sopand
@@ -112,7 +112,7 @@ The registration details report shows the following information for each user:
112112
- SSPR Registered (Registered, Not Registered)
113113
- SSPR Enabled (Enabled, Not Enabled)
114114
- SSPR Capable (Capable, Not Capable)
115-
- Methods registered (Email, Mobile Phone, Alternative Mobile Phone, Office Phone, Microsoft Authenticator Push, Software One Time Passcode, FIDO2, Security Key, Security questions)
115+
- Methods registered (Email, Mobile Phone, Alternative Mobile Phone, Office Phone, Microsoft Authenticator Push, Software One Time Passcode, FIDO2, Security Key, Security questions, Hardware OATH token)
116116

117117
![Screenshot of user registration details](media/how-to-authentication-methods-usage-insights/registration-details.png)
118118

@@ -133,7 +133,7 @@ The registration details report shows the following information for each user:
133133
## Limitations
134134

135135
- The data in the report is not updated in real-time and may reflect a latency of up to a few hours.
136-
- The **PhoneAppNotification** or **PhoneAppOTP** methods that a user might have configured are not displayed in the dashboard.
136+
- The **PhoneAppNotification** or **PhoneAppOTP** methods that a user might have configured are not displayed in the dashboard on **Azure AD Authentication methods - Policies**.
137137

138138
## Next steps
139139

articles/active-directory/reports-monitoring/concept-activity-logs-azure-monitor.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.topic: conceptual
99
ms.workload: identity
1010
ms.subservice: report-monitor
11-
ms.date: 12/02/2022
11+
ms.date: 01/12/2023
1212
ms.author: sarahlipsey
1313
ms.reviewer: besiler
1414
ms.collection: M365-identity-device-management
@@ -57,11 +57,12 @@ Once you have your endpoint established, go to **Azure AD** and then **Diagnosti
5757

5858
If you already have an Azure AD license, you need an Azure subscription to set up the storage account and Event Hubs. The Azure subscription comes at no cost, but you have to pay to utilize Azure resources, including the storage account that you use for archival and the Event Hubs that you use for streaming. The amount of data and, thus, the cost incurred, can vary significantly depending on the tenant size.
5959

60+
Azure Monitor provides the option to exclude whole events, fields, or parts of fields when ingesting logs from Azure AD. Learn more about this cost saving feature in [Data collection transformation in Azure Monitor](../../azure-monitor/essentials/data-collection-transformations.md).
61+
6062
### Storage size for activity logs
6163

6264
Every audit log event uses about 2 KB of data storage. Sign in event logs are about 4 KB of data storage. For a tenant with 100,000 users, which would incur about 1.5 million events per day, you would need about 3 GB of data storage per day. Because writes occur in approximately five-minute batches, you can anticipate approximately 9,000 write operations per month.
6365

64-
6566
The following table contains a cost estimate of, depending on the size of the tenant, a general-purpose v2 storage account in West US for at least one year of retention. To create a more accurate estimate for the data volume that you anticipate for your application, use the [Azure storage pricing calculator](https://azure.microsoft.com/pricing/details/storage/blobs/).
6667

6768

@@ -75,9 +76,6 @@ The following table contains a cost estimate of, depending on the size of the te
7576

7677
If you want to know for how long the activity data is stored in a Premium tenant, see: [How long does Azure AD store the data?](reference-reports-data-retention.md#how-long-does-azure-ad-store-the-data)
7778

78-
79-
80-
8179
### Event Hubs messages for activity logs
8280

8381
Events are batched into approximately five-minute intervals and sent as a single message that contains all the events within that timeframe. A message in the Event Hubs has a maximum size of 256 KB. If the total size of all the messages within the timeframe exceeds that volume, multiple messages are sent.

articles/active-directory/reports-monitoring/concept-all-sign-ins.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.topic: conceptual
99
ms.workload: identity
1010
ms.subservice: report-monitor
11-
ms.date: 01/05/2023
11+
ms.date: 01/12/2023
1212
ms.author: sarahlipsey
1313
ms.reviewer: besiler
1414
ms.collection: M365-identity-device-management
@@ -262,6 +262,7 @@ When analyzing authentication details, take note of the following details:
262262
- The **Authentication details** tab can initially show incomplete or inaccurate data until log information is fully aggregated. Known examples include:
263263
- A **satisfied by claim in the token** message is incorrectly displayed when sign-in events are initially logged.
264264
- The **Primary authentication** row isn't initially logged.
265+
- If you're unsure of a detail in the logs, gather the **Request ID** and **Correlation ID** to use for further analyzing or troubleshooting.
265266

266267
## Sign-in data used by other services
267268

articles/active-directory/reports-monitoring/concept-sign-ins.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.topic: conceptual
99
ms.workload: identity
1010
ms.subservice: report-monitor
11-
ms.date: 11/04/2022
11+
ms.date: 01/12/2023
1212
ms.author: sarahlipsey
1313
ms.reviewer: besiler
1414
ms.collection: M365-identity-device-management
@@ -156,7 +156,8 @@ When analyzing authentication details, take note of the following details:
156156
- **OATH verification code** is logged as the authentication method for both OATH hardware and software tokens (such as the Microsoft Authenticator app).
157157
- The **Authentication details** tab can initially show incomplete or inaccurate data until log information is fully aggregated. Known examples include:
158158
- A **satisfied by claim in the token** message is incorrectly displayed when sign-in events are initially logged.
159-
- The **Primary authentication** row isn't initially logged.
159+
- The **Primary authentication** row isn't initially logged.
160+
- If you're unsure of a detail in the logs, gather the **Request ID** and **Correlation ID** to use for further analyzing or troubleshooting.
160161

161162
## Sign-in data used by other services
162163

4.5 KB
Loading

articles/active-directory/reports-monitoring/toc.yml

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -95,10 +95,6 @@ items:
9595
href: concept-sign-in-diagnostics-scenarios.md
9696
- name: Troubleshoot sign-in errors for a user
9797
href: howto-troubleshoot-sign-in-errors.md
98-
- name: Missing audit data
99-
href: troubleshoot-missing-audit-data.md
100-
- name: Missing data in download
101-
href: troubleshoot-missing-data-download.md
10298
- name: Cannot access Graph APIs for reporting
10399
href: troubleshoot-graph-api.md
104100
- name: Audit data on verified domain change

articles/active-directory/reports-monitoring/workbook-legacy authentication.md renamed to articles/active-directory/reports-monitoring/workbook-legacy-authentication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ This article gives you an overview of this workbook.
2525

2626
## Description
2727

28-
![Workbook category](./media/workbook-risk-analysis/workbook-category.png)
28+
![Screenshot of workbook thumbnail.](./media/workbook-legacy-authentication/sign-ins-legacy-auth.png)
2929

3030
Azure AD supports several of the most widely used authentication and authorization protocols including legacy authentication. Legacy authentication refers to basic authentication, which was once a widely used industry-standard method for passing user name and password information through a client to an identity provider.
3131

0 commit comments

Comments
 (0)