Skip to content

Commit a99c4fa

Browse files
Merge pull request #212567 from MicrosoftGuyJFlo/GitHubIssue98324
[Azure AD] Conditional Access - GitHub Issue 98324
2 parents 57add7f + 121b26e commit a99c4fa

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/active-directory/conditional-access/block-legacy-authentication.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -90,8 +90,8 @@ Before you can block legacy authentication in your directory, you need to first
9090
#### Indicators from Azure AD
9191

9292
1. Navigate to the **Azure portal** > **Azure Active Directory** > **Sign-in logs**.
93-
1. Add the Client App column if it isn't shown by clicking on **Columns** > **Client App**.
94-
1. **Add filters** > **Client App** > select all of the legacy authentication protocols. Select outside the filtering dialog box to apply your selections and close the dialog box.
93+
1. Add the **Client App** column if it isn't shown by clicking on **Columns** > **Client App**.
94+
1. Select **Add filters** > **Client App** > choose all of the legacy authentication protocols and select **Apply**.
9595
1. If you've activated the [new sign-in activity reports preview](../reports-monitoring/concept-all-sign-ins.md), repeat the above steps also on the **User sign-ins (non-interactive)** tab.
9696

9797
Filtering will only show you sign-in attempts that were made by legacy authentication protocols. Clicking on each individual sign-in attempt will show you more details. The **Client App** field under the **Basic Info** tab will indicate which legacy authentication protocol was used.

0 commit comments

Comments
 (0)