Skip to content

Commit 99a6a43

Browse files
authored
Merge pull request #47779 from MicrosoftDocs/master
7/30 PM Publish
2 parents 30fd606 + f572b0f commit 99a6a43

File tree

110 files changed

+1494
-652
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

110 files changed

+1494
-652
lines changed

articles/active-directory-domain-services/active-directory-ds-suspension.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -19,14 +19,14 @@ ms.author: ergreenl
1919

2020
---
2121
# Suspended domains
22-
When Azure AD Domain Services is unable to service a managed domain for a long period of time, it puts the managed domain into a suspended state. This article explains why managed domains are suspended, and how to remediate a suspended domain.
22+
When Azure Active Directory Domain Services (Azure AD DS) is unable to service a managed domain for a long period of time, it puts the managed domain into a suspended state. This article explains why managed domains are suspended, and how to remediate a suspended domain.
2323

2424

2525
## States your managed domain can be in
2626

2727
![Suspended domain timeline](media\active-directory-domain-services-suspension\suspension-timeline.PNG)
2828

29-
The preceding graphic outlines the possible states an Azure AD Domain Services managed domain can be in.
29+
The preceding graphic outlines the possible states an Azure AD DS managed domain can be in.
3030

3131
### "Running" state
3232
A managed domain that is configured correctly and operating regularly is in the **Running** state.
@@ -62,15 +62,15 @@ In some cases (for example, if you have an invalid network configuration), the d
6262
### The "Suspended" state
6363
A managed domain is put in the **Suspended** state for the following reasons:
6464

65-
* One or more critical alerts haven't been resolved in 15 days. Critical alerts can be caused by a misconfiguration that blocks access to resources that are needed by Azure AD Domain Services.
65+
* One or more critical alerts haven't been resolved in 15 days. Critical alerts can be caused by a misconfiguration that blocks access to resources that are needed by Azure AD DS.
6666
* For example, the alert [AADDS104: Network Error](active-directory-ds-troubleshoot-nsg.md) has been unresolved for more than 15 days in the managed domain.
6767
* There's a billing issue with your Azure subscription or your Azure subscription has expired.
6868

6969
Managed domains are suspended when Microsoft is unable to manage, monitor, patch, or back up the domain on an ongoing basis.
7070

7171
**What to expect**
7272
* Domain controllers for your managed domain are de-provisioned and aren't reachable within the virtual network.
73-
* Secure LDAP access to the managed domain over the Internet (if it's enabled) stops working.
73+
* Secure LDAP access to the managed domain over the internet (if it's enabled) stops working.
7474
* You notice failures in authenticating to the managed domain, logging on to domain-joined virtual machines, or connecting over LDAP/LDAPS.
7575
* Backups for your managed domain are no longer taken.
7676
* Synchronization with Azure AD stops.
@@ -86,18 +86,18 @@ A managed domain that stays in the "Suspended" state for 15 days is **Deleted**.
8686

8787
**What to expect**
8888
* All resources and backups for the managed domain are deleted.
89-
* You can't restore the managed domain, and need to create a new managed domain to use Azure AD Domain Services.
89+
* You can't restore the managed domain, and need to create a new managed domain to use Azure AD DS.
9090
* After it's deleted, you aren't billed for the managed domain.
9191

9292

9393
## How do you know if your managed domain is suspended?
94-
You see an [alert](active-directory-ds-troubleshoot-alerts.md) on the Azure AD Domain Services Health page in the Azure portal that declares that the domain is suspended. The state of the domain also shows "Suspended".
94+
You see an [alert](active-directory-ds-troubleshoot-alerts.md) on the Azure AD DS Health page in the Azure portal that declares that the domain is suspended. The state of the domain also shows "Suspended".
9595

9696

9797
## Restore a suspended domain
9898
To restore a domain that's in the "Suspended" state, take the following steps:
9999

100-
1. Go to the [Azure AD Domain Services page](https://portal.azure.com/#blade/HubsExtension/Resources/resourceType/Microsoft.AAD%2FdomainServices) in the Azure portal.
100+
1. Go to the [Azure Active Directory Domain Services page](https://portal.azure.com/#blade/HubsExtension/Resources/resourceType/Microsoft.AAD%2FdomainServices) in the Azure portal.
101101
2. Select the managed domain.
102102
3. In the left panel, select **Health**.
103103
4. Select the alert. The alert ID will be either AADDS503 or AADDS504, depending on the cause of suspension.
@@ -108,7 +108,7 @@ Your managed domain can only be restored to the date of the last backup. The dat
108108

109109
## Next steps
110110
- [Resolve alerts for your managed domain](active-directory-ds-troubleshoot-alerts.md)
111-
- [Read more about Azure AD Domain Services](active-directory-ds-overview.md)
111+
- [Read more about Azure Active Directory Domain Services](active-directory-ds-overview.md)
112112
- [Contact the product team](active-directory-ds-contact-us.md)
113113

114114
## Contact us

articles/active-directory/authentication/howto-mfa-reporting.md

Lines changed: 86 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.component: authentication
88
ms.topic: conceptual
9-
ms.date: 07/11/2018
9+
ms.date: 07/30/2018
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -26,14 +26,98 @@ Azure Multi-Factor Authentication provides several reports that can be used by y
2626
| Bypassed User History | Azure AD > MFA Server > One-time bypass | Provides a history of requests to bypass Multi-Factor Authentication for a user. |
2727
| Server status | Azure AD > MFA Server > Server status | Displays the status of Multi-Factor Authentication Servers associated with your account. |
2828

29-
## View reports
29+
## View MFA reports
3030

3131
1. Sign in to the [Azure portal](https://portal.azure.com).
3232
2. On the left, select **Azure Active Directory** > **MFA Server**.
3333
3. Select the report that you wish to view.
3434

3535
<center>![Cloud](./media/howto-mfa-reporting/report.png)</center>
3636

37+
## Azure AD sign-ins report
38+
39+
With the **sign-ins activity report** in the [Azure portal](https://portal.azure.com), you can get the information you need to determine how your environment is doing.
40+
41+
The sign-ins report can provide you with information about the usage of managed applications and user sign-in activities, which includes information about multi-factor authentication (MFA) usage. The MFA data gives you insights into how MFA is working in your organization. It enables you to answer questions like:
42+
43+
- Was the sign-in challenged with MFA?
44+
- How did the user complete MFA?
45+
- Why was the user unable to complete MFA?
46+
- How many users are challenged for MFA?
47+
- How many users are unable to complete the MFA challenge?
48+
- What are the common MFA issues end users are running into?
49+
50+
This data is available through the [Azure portal](https://portal.azure.com) and the [reporting API](../active-directory-reporting-api-getting-started-azure-portal.md).
51+
52+
![Cloud](./media/howto-mfa-reporting/sign-in-report.png)
53+
54+
### Sign-ins report structure
55+
56+
The sign-in activity reports for MFA give you access to the following information:
57+
58+
**MFA required:** Whether MFA is required for the sign-in or not. MFA can be required due to per-user MFA, conditional access, or other reasons. Possible values are **Yes** or **No**.
59+
60+
**MFA Result:** More information on whether MFA was satisfied or denied:
61+
62+
- If MFA was satisfied, this column provides more information about how MFA was satisfied.
63+
- Azure Multi-Factor Authentication
64+
- completed in the cloud
65+
- has expired due to the policies configured on tenant
66+
- registration prompted
67+
- satisfied by claim in the token
68+
- satisfied by claim provided by external provider
69+
- satisfied by strong authentication
70+
- skipped as flow exercised was Windows broker logon flow
71+
- skipped due to app password
72+
- skipped due to location
73+
- skipped due to registered device
74+
- skipped due to remembered device
75+
- successfully completed
76+
- Redirected to external provider for multi-factor authentication
77+
78+
- If MFA was denied, this column would provide the reason for denial.
79+
- Azure Multi-Factor Authentication denied;
80+
- authentication in-progress
81+
- duplicate authentication attempt
82+
- entered incorrect code too many times
83+
- invalid authentication
84+
- invalid mobile app verification code
85+
- misconfiguration
86+
- phone call went to voicemail
87+
- phone number has an invalid format
88+
- service error
89+
- unable to reach the user’s phone
90+
- unable to send the mobile app notification to the device
91+
- unable to send the mobile app notification
92+
- user declined the authentication
93+
- user did not respond to mobile app notification
94+
- user does not have any verification methods registered
95+
- user entered incorrect code
96+
- user entered incorrect PIN
97+
- user hung up the phone call without succeeding the authentication
98+
- user is blocked
99+
- user never entered the verification code
100+
- user not found
101+
- verification code already used once
102+
103+
**MFA authentication method:** The authentication method the user used to complete MFA. Possible values include:
104+
105+
- Text message
106+
- Mobile app notification
107+
- Phone call (Authentication phone)
108+
- Mobile app verification code
109+
- Phone call (Office phone)
110+
- Phone call (Alternate authentication phone)
111+
112+
**MFA authentication detail:** Scrubbed version of the phone number, for example: +X XXXXXXXX64.
113+
114+
**Conditional Access** Find information about conditional access policies that affected the sign-in attempt including:
115+
116+
- Policy name
117+
- Grant controls
118+
- Session controls
119+
- Result
120+
37121
## PowerShell reporting
38122

39123
Identify users who have registered for MFA using the PowerShell that follows.
132 KB
Loading

0 commit comments

Comments
 (0)