Skip to content

Commit 9ef79fc

Browse files
committed
blocking-issues-fix
1 parent 1029ebd commit 9ef79fc

17 files changed

+30
-30
lines changed

articles/active-directory/authentication/concepts-azure-multi-factor-authentication-prompts-session-lifetime.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: active-directory
77
ms.subservice: authentication
88
ms.custom: has-azure-ad-ps-ref
99
ms.topic: conceptual
10-
ms.date: 08/21/2023
10+
ms.date: 08/22/2023
1111

1212
ms.author: justinha
1313
author: justinha
@@ -46,7 +46,7 @@ To optimize the frequency of authentication prompts for your users, you can conf
4646

4747
### Evaluate session lifetime policies
4848

49-
Without any session lifetime settings, there are no persistent cookies in the browser session. Every time a user closes and open the browser, they get a prompt for reauthentication. In Office clients, the default time period is a rolling window of 90 days. With this default Office configuration, if the user has reset their password or there has been inactivity of over 90 days, the user is required to reauthenticate with all required factors (first and second factor).
49+
Without any session lifetime settings, there are no persistent cookies in the browser session. Every time a user closes and opens the browser, they get a prompt for reauthentication. In Office clients, the default time period is a rolling window of 90 days. With this default Office configuration, if the user has reset their password or there has been inactivity of over 90 days, the user is required to reauthenticate with all required factors (first and second factor).
5050

5151
A user might see multiple MFA prompts on a device that doesn't have an identity in Azure AD. Multiple prompts result when each application has its own OAuth Refresh Token that isn't shared with other client apps. In this scenario, MFA prompts multiple times as each application requests an OAuth Refresh Token to be validated with MFA.
5252

articles/active-directory/reports-monitoring/concept-sign-in-log-activity-details.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.reviewer: besiler
1818
Azure AD logs all sign-ins into an Azure tenant for compliance purposes. As an IT administrator, you need to know what the values in the sign-in logs mean, so that you can interpret the log values correctly.
1919

2020
- [Learn about the sign-in logs](concept-sign-ins.md).
21-
- [Customize and filter the sign-in logs](howto-customize-filter-logs.md)
21+
- [Customize and filter the sign-in logs](howto-customize-filter-sign-in-logs.md)
2222

2323
This article explains the values on the Basic info tab of the sign-ins log.
2424

@@ -60,7 +60,7 @@ When analyzing authentication details, take note of the following details:
6060
- A **satisfied by claim in the token** message is incorrectly displayed when sign-in events are initially logged.
6161
- The **Primary authentication** row isn't initially logged.
6262
- If you're unsure of a detail in the logs, gather the **Request ID** and **Correlation ID** to use for further analyzing or troubleshooting.
63-
- If Conditional Access policies for authentication or session lifetime are applied, they are listed above the sign-in attempts. If you don't see either of these, those policies aren't currently applied. For more information, see [Conditional Access session controls](../conditional-access/concept-conditional-access-session.md).
63+
- If Conditional Access policies for authentication or session lifetime are applied, they're listed above the sign-in attempts. If you don't see either of these, those policies aren't currently applied. For more information, see [Conditional Access session controls](../conditional-access/concept-conditional-access-session.md).
6464

6565

6666
## Unique identifiers
@@ -71,7 +71,7 @@ In Azure AD, a resource access has three relevant components:
7171
- **How** – The client (Application) used for the access.
7272
- **What** – The target (Resource) accessed by the identity.
7373

74-
Each component has an associated unique identifier (ID). Below is an example of user using the Microsoft Azure classic deployment model to access the Azure portal.
74+
Each component has an associated unique identifier (ID).
7575

7676
### Tenant
7777

@@ -85,12 +85,12 @@ For the home tenant, Azure AD tracks the ID and the name.
8585

8686
### Request ID
8787

88-
The request ID is an identifier that corresponds to an issued token. If you are looking for sign-ins with a specific token, you need to extract the request ID from the token, first.
88+
The request ID is an identifier that corresponds to an issued token. If you're looking for sign-ins with a specific token, you need to extract the request ID from the token, first.
8989

9090

9191
### Correlation ID
9292

93-
The correlation ID groups sign-ins from the same sign-in session. The identifier was implemented for convenience. Its accuracy is not guaranteed because the value is based on parameters passed by a client.
93+
The correlation ID groups sign-ins from the same sign-in session. The identifier was implemented for convenience. Its accuracy isn't guaranteed because the value is based on parameters passed by a client.
9494

9595
### Sign-in
9696

@@ -121,14 +121,14 @@ The type of a user. Examples include `member`, `guest`, or `external`.
121121

122122
This attribute describes the type of cross-tenant access used by the actor to access the resource. Possible values are:
123123

124-
- `none` - A sign-in event that did not cross an Azure AD tenant's boundaries.
124+
- `none` - A sign-in event that didn't cross an Azure AD tenant's boundaries.
125125
- `b2bCollaboration`- A cross tenant sign-in performed by a guest user using B2B Collaboration.
126126
- `b2bDirectConnect` - A cross tenant sign-in performed by a B2B.
127127
- `microsoftSupport`- A cross tenant sign-in performed by a Microsoft support agent in a Microsoft customer tenant.
128128
- `serviceProvider` - A cross-tenant sign-in performed by a Cloud Service Provider (CSP) or similar admin on behalf of that CSP's customer in a tenant
129129
- `unknownFutureValue` - A sentinel value used by MS Graph to help clients handle changes in enum lists. For more information, see [Best practices for working with Microsoft Graph](/graph/best-practices-concept).
130130

131-
If the sign-in did not the pass the boundaries of a tenant, the value is `none`.
131+
If the sign-in didn't the pass the boundaries of a tenant, the value is `none`.
132132

133133
### Conditional Access evaluation
134134

articles/active-directory/reports-monitoring/concept-sign-ins.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -8,25 +8,25 @@ ms.service: active-directory
88
ms.topic: conceptual
99
ms.workload: identity
1010
ms.subservice: report-monitor
11-
ms.date: 08/16/2023
11+
ms.date: 08/22/2023
1212
ms.author: sarahlipsey
1313
ms.reviewer: besiler
1414
---
1515
# What are Azure Active Directory sign-in logs?
1616

1717
Azure Active Directory (Azure AD) logs all sign-ins into an Azure tenant, which includes your internal apps and resources. As an IT administrator, you need to know what the values in the sign-in logs mean, so that you can interpret the log values correctly.
1818

19-
Reviewing sign-in errors and patterns provides valuable insight into how your users access applications and services. The sign-in logs provided by Azure Azure AD are a powerful type of [activity log](overview-reports.md) that you can analyze. This article explains how to access and utilize the sign-in logs.
19+
Reviewing sign-in errors and patterns provides valuable insight into how your users access applications and services. The sign-in logs provided by Azure AD are a powerful type of [activity log](overview-reports.md) that you can analyze. This article explains how to access and utilize the sign-in logs.
2020

21-
The preview view of the sign-in logs include interactive and non-interactive user sign-ins as well as service principle and managed identity sign-ins. You can still view the classic sign-in logs, which only include interactive sign-ins.
21+
The preview view of the sign-in logs includes interactive and non-interactive user sign-ins as well as service principal and managed identity sign-ins. You can still view the classic sign-in logs, which only include interactive sign-ins.
2222

2323
Two other activity logs are also available to help monitor the health of your tenant:
2424
- **[Audit](concept-audit-logs.md)** – Information about changes applied to your tenant, such as users and group management or updates applied to your tenant’s resources.
2525
- **[Provisioning](concept-provisioning-logs.md)** – Activities performed by a provisioning service, such as the creation of a group in ServiceNow or a user imported from Workday.
2626

2727
## What can you do with sign-in logs?
2828

29-
You can use the sing-in logs to answer questions such as:
29+
You can use the sign-in logs to answer questions such as:
3030

3131
- How many users have signed into a particular application this week?
3232
- How many failed sign-in attempts have occurred in the last 24 hours?
@@ -54,10 +54,10 @@ The classic sign-in logs only include interactive user sign-ins.
5454

5555
Interactive user sign-ins provide an authentication factor to Azure AD. That authentication factor could also interact with a helper app, such as the Microsoft Authenticator app. Users can provide passwords, responses to MFA challenges, biometric factors, or QR codes to Azure AD or to a helper app. This log also includes federated sign-ins from identity providers that are federated to Azure AD.
5656

57-
![Screenshot of the interactive user sign-ins log.](media/concept-sign-ins/sign-in-logs-user-interactive.png)
57+
:::image type="content" source="media/concept-sign-ins/sign-in-logs-user-interactive.png" alt-text="Screenshot of the interactive user sign-ins log." lightbox="media/concept-sign-ins/sign-in-logs-user-interactive-expanded.png":::
5858

5959
> [!NOTE]
60-
> The interactive user sign-in log previously contained some non-interactive sign-ins from Microsoft Exchange clients. Although those sign-ins were non-interactive, they were included in the interactive user sign-in log for additional visibility. Once the non-interactive user sign-in log entered public preview in November 2020, those non-interactive sign-in logs were moved to the non-interactive user sign in log for increased accuracy.
60+
> The interactive user sign-in log previously contained some non-interactive sign-ins from Microsoft Exchange clients. Although those sign-ins were non-interactive, they were included in the interactive user sign-in log for additional visibility. Once the non-interactive user sign-in log entered public preview in November 2020, those non-interactive sign-in logs were moved to the non-interactive user sign-in log for increased accuracy.
6161
6262
**Report size:** small </br>
6363
**Examples:**
@@ -97,7 +97,7 @@ To make it easier to digest the data, non-interactive sign-in events are grouped
9797

9898
:::image type="content" source="media/concept-sign-ins/aggregate-sign-in.png" alt-text="Screenshot of an aggregate sign-in expanded to show all rows." lightbox="media/concept-sign-ins/aggregate-sign-in-expanded.png":::
9999

100-
When Azure AD logs multiple sign-ins that are identical other than time and date, those sign-ins are from the same entity and are aggregated into a single row. A row with multiple identical sign-ins (except for date and time issued) have a value greater than 1 in the *# sign-ins* column. These aggregated sign-ins may also appear to have the same time stamps. The **Time aggregate** filter can set to 1 hour, 6 hours, or 24 hours. You can expand the row to see all the different sign-ins and their different time stamps.
100+
When Azure AD logs multiple sign-ins that are identical other than time and date, those sign-ins are from the same entity and are aggregated into a single row. A row with multiple identical sign-ins (except for date and time issued) has a value greater than 1 in the *# sign-ins* column. These aggregated sign-ins may also appear to have the same time stamps. The **Time aggregate** filter can set to 1 hour, 6 hours, or 24 hours. You can expand the row to see all the different sign-ins and their different time stamps.
101101

102102
Sign-ins are aggregated in the non-interactive users when the following data matches:
103103

@@ -142,7 +142,7 @@ Managed identities for Azure resources sign-ins are sign-ins that were performed
142142

143143
You can't customize the fields shown in this report.
144144

145-
To make it easier to digest the data, managed identities for Azure resources sign in logs, non-interactive sign-in events are grouped. Sign-ins from the same entity are aggregated into a single row. You can expand the row to see all the different sign-ins and their different time stamps. Sign-ins are aggregated in the managed identities report when all of the following data matches:
145+
To make it easier to digest the data, managed identities for Azure resources sign-in logs, non-interactive sign-in events are grouped. Sign-ins from the same entity are aggregated into a single row. You can expand the row to see all the different sign-ins and their different time stamps. Sign-ins are aggregated in the managed identities report when all of the following data matches:
146146

147147
- Managed identity name or ID
148148
- Status

articles/active-directory/reports-monitoring/howto-customize-filter-logs.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -45,27 +45,27 @@ You can always access your own sign-in history at [https://mysignins.microsoft.c
4545

4646
With the information in the Azure AD audit logs, you can access all records of system activities for compliance purposes. Audit logs can be accessed from the **Monitoring and health** section of Azure AD, where you can sort and filter on every category and activity. You can also access audit logs in the area of the portal for the service you're investigating.
4747

48-
![Screenshot of the audit logs option on the side menu.](media/howto-customize-filter-logs/audit-logs-nav.png)
48+
![Screenshot of the audit logs option on the side menu.](media/howto-customize-filter-logs/audit-logs-navigation.png)
4949

5050
For example, if you're looking into changes to Azure AD groups, you can access the Audit logs from **Azure AD** > **Groups**. When you access the audit logs from the service, the filter is automatically adjusted according to the service.
5151

5252
![Screenshot of the audit logs option from the Groups menu.](media/howto-customize-filter-logs/audit-logs-groups.png)
5353

5454
### Customize the layout of the audit logs
5555

56-
Audit logs can be customized like the sign-in logs. There aren't as many column options, but it's just as important to make sure you're seeing the columns you need. The **Service**, **Category** and **Activity** columns are related to each other, so these should always be visible.
56+
Audit logs can be customized like the sign-in logs. There aren't as many column options, but it's as important to make sure you're seeing the columns you need. The **Service**, **Category** and **Activity** columns are related to each other, so these columns should always be visible.
5757

5858
### Filter the audit logs
5959

6060
When you filter the logs by **Service**, the **Category** and **Activity** details automatically change. In some cases, there may only be one Category or Activity. For a detailed table of all potential combinations of these details, see [Audit activities](reference-audit-activities.md).
6161

62-
![Screenshot of the audit log activities filter with Conditional Access as the service.](media/howto-customize-filter-logs/audit-log-activities-filter.png)
62+
:::image type="content" source="media/howto-customize-filter-logs/audit-log-activities-filter.png" alt-text="Screenshot of the audit log activities filter with Conditional Access as the service." lightbox="media/howto-customize-filter-logs/audit-log-activities-filter-expanded.png":::
6363

6464
## Sign-in logs
6565

66-
On the sign-in logs page, you can switch between four sign-in log types. For more information on the the logs, see [What are Azure AD sign-in logs?](concept-sign-ins.md).
66+
On the sign-in logs page, you can switch between four sign-in log types. For more information on the logs, see [What are Azure AD sign-in logs?](concept-sign-ins.md).
6767

68-
![Screenshot of the sign-in log types.](./media/howto-customize-filter-logs/sign-in-logs-types.png)
68+
:::image type="content" source="media/howto-customize-filter-logs/sign-in-logs-types.png" alt-text="Screenshot of the sign-in log types." lightbox="media/howto-customize-filter-logs/sign-in-logs-types-expanded.png":::
6969

7070
- **Interactive user sign-ins:** Sign-ins where a user provides an authentication factor, such as a password, a response through an MFA app, a biometric factor, or a QR code.
7171

@@ -94,7 +94,7 @@ Select the **Add filters** option from the top of the table to get started.
9494

9595
![Screenshot of the sign-in logs page with the Add filters option highlighted.](./media/howto-customize-filter-logs/sign-in-logs-add-filters.png)
9696

97-
Once you apply a filter, you may to either enter a specific detail - such as a Request ID - or select another filter option.
97+
Once you apply a filter, you may either enter a specific detail - such as a Request ID - or select another filter option.
9898

9999
![Screenshot of the filter options with a field to enter filter details open.](./media/howto-customize-filter-logs/sign-in-logs-filter-options.png)
100100

@@ -113,7 +113,7 @@ You can filter on several details. The following table describes some commonly u
113113

114114
Now that your sign-in logs table is formatted for your needs, you can more effectively analyze the data. Further analysis and retention of sign-in data can be accomplished by exporting the logs to other tools.
115115

116-
Customizing the columns and adjusting the filter helps to look at logs with similar characteristics. To look at the details of a sign-in select a row in the table to open the **Activity Details** panel. There are several tabs in the panel to explore. For more information, see [Sign-in log activity details](concept-sign-in-log-activity-details.md).
116+
Customizing the columns and adjusting the filter helps to look at logs with similar characteristics. To look at the details of a sign-in, select a row in the table to open the **Activity Details** panel. There are several tabs in the panel to explore. For more information, see [Sign-in log activity details](concept-sign-in-log-activity-details.md).
117117

118118
:::image type="content" source="media/howto-customize-filter-logs/sign-in-activity-details.png" alt-text="Screenshot of the sign-in activity details." lightbox="media/howto-customize-filter-logs/sign-in-activity-details-expanded.png":::
119119

@@ -123,14 +123,14 @@ Customizing the columns and adjusting the filter helps to look at logs with simi
123123

124124
- **Conditional Access:**
125125
- *Not applied:* No policy applied to the user and application during sign-in.
126-
- *Success:* One or more Conditional Access policies applied to or were evaluated for the user and application (but not necessarily the other conditions) during sign-in. Even though a Conditional Access policy might not apply, if it was evaluated, the Conditional Access status will show 'Success'.
126+
- *Success:* One or more Conditional Access policies applied to or were evaluated for the user and application (but not necessarily the other conditions) during sign-in. Even though a Conditional Access policy might not apply, if it was evaluated, the Conditional Access status shows *Success*.
127127
- *Failure:* The sign-in satisfied the user and application condition of at least one Conditional Access policy and grant controls are either not satisfied or set to block access.
128128

129-
- **Home tenant name:** Due to privacy commitments, Azure AD does not populate the home tenant name field in the case of a cross-tenant scenario.
129+
- **Home tenant name:** Due to privacy commitments, Azure AD doesn't populate the home tenant name field during cross-tenant scenarios.
130130

131131
- **Multifactor authentication:** When a user signs in with MFA, several separate MFA events are actually taking place. For example, if a user enters the wrong validation code or doesn't respond in time, additional MFA events are sent to reflect the latest status of the sign-in attempt. These sign-in events appear as one line item in the Azure AD sign-in logs. That same sign-in event in Azure Monitor, however, appears as multiple line items. These events all have the same `correlationId`.
132132

133-
- **Client app:** The **Client app** filter option has two sub-categories: **Modern authentication clients** and **Legacy authentication clients**.
133+
- **Client app:** The **Client app** filter option has two subcategories: **Modern authentication clients** and **Legacy authentication clients**.
134134
- *Browser* and *Mobile apps and desktop clients* are the two options in the Modern authentication clients category.
135135
- Review the following table for the *Legacy authentication client* details.
136136

539 Bytes
Loading
-62.5 KB
Loading
-29.7 KB
Loading
255 KB
Loading
-48.3 KB
Loading

0 commit comments

Comments
 (0)