Skip to content

Commit accb6e6

Browse files
authored
Merge pull request #213645 from shlipsey3/reports-ownership-100422
faq-metadata-update
2 parents f8fa746 + fbceeee commit accb6e6

File tree

1 file changed

+19
-23
lines changed

1 file changed

+19
-23
lines changed

articles/active-directory/reports-monitoring/reports-faq.yml

Lines changed: 19 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -3,18 +3,14 @@ metadata:
33
title: Azure Active Directory reports FAQ | Microsoft Docs
44
description: Frequently asked questions around Azure Active Directory reports.
55
services: active-directory
6-
documentationcenter: ''
7-
author: cawrites
8-
manager: MarkusVi
9-
10-
ms.assetid: 534da0b1-7858-4167-9986-7a62fbd10439
6+
author: shlipsey3
7+
manager: amycolannino
118
ms.service: active-directory
129
ms.workload: identity
13-
ms.tgt_pltfrm: na
1410
ms.topic: faq
1511
ms.subservice: report-monitor
16-
ms.date: 11/23/2021
17-
ms.author: markvi
12+
ms.date: 10/04/2022
13+
ms.author: sarahlipsey
1814
ms.reviewer: besiler
1915
ms.collection: M365-identity-device-management
2016
title: Frequently asked questions around Azure Active Directory reports
@@ -48,12 +44,12 @@ sections:
4844
- question: |
4945
Can I see last month's data after getting an Azure AD premium license?
5046
answer: |
51-
If you have recently switched to a Premium version (including a trial version), you can see data up to 7 days initially. When data accumulates, you can see data for the past 30 days.
47+
If you've recently switched to a Premium version (including a trial version), you can see data up to 7 days initially. When data accumulates, you can see data for the past 30 days.
5248
5349
- question: |
5450
Do I need to be a global administrator to see the activity sign-ins to the Azure portal or to get data through the API?
5551
answer: |
56-
No, you can also access the reporting data through the portal or through the API if you are a **Security Reader** or **Security Administrator** for the tenant. Of course, **Global Administrators** will also have access to this data.
52+
No, you can also access the reporting data through the portal or through the API if you're a **Security Reader** or **Security Administrator** for the tenant. **Global Administrators** will also have access to this data.
5753
5854
- name: Activity logs
5955
questions:
@@ -63,14 +59,14 @@ sections:
6359
For more information, see [data retention policies for Azure AD reports](reference-reports-data-retention.md).
6460
6561
- question: |
66-
How long does it take until I can see the activity data after I have completed my task?
62+
How long does it take until I can see the activity data after I've completed my task?
6763
answer: |
6864
Audit logs have a latency ranging from 15 minutes to an hour. Sign-in activity logs can take from 15 minutes to up to 2 hours for some records.
6965
7066
- question: |
7167
Can I get Microsoft 365 activity log information through the Azure portal?
7268
answer: |
73-
Even though Microsoft 365 activity and Azure AD activity logs share a lot of the directory resources, if you want a full view of the Microsoft 365 activity logs, you should go to the [Microsoft 365 admin center](https://admin.microsoft.com) to get Office 365 Activity log information.
69+
Microsoft 365 and Azure AD activity logs share many directory resources. If you want a full view of the Microsoft 365 activity logs, you should go to the [Microsoft 365 admin center](https://admin.microsoft.com) to get Office 365 Activity log information.
7470
7571
- question: |
7672
Which APIs do I use to get information about Microsoft 365 Activity logs?
@@ -88,11 +84,11 @@ sections:
8884
- question: |
8985
What data is included in the CSV file I can download from the Azure AD sign-in logs?
9086
answer: |
91-
The CSV includes sign-in logs for your users and service principals. However, data that is represented as a nested array in the MS Graph API for sign in logs is not included. For example, conditional access policies and report-only information are not included. If you need to export all the information contained in your sign-in logs, use the **Export Data Settings** feature.
87+
The CSV includes sign-in logs for your users and service principals. However, data that is represented as a nested array in the MS Graph API for sign-in logs isn't included. For example, conditional access policies and report-only information aren't included. If you need to export all the information contained in your sign-in logs, use the **Export Data Settings** feature.
9288
- question: |
93-
I see .XXX in part of the IP address from a user in my sign in logs. Why is that happening?
89+
I see .XXX in part of the IP address from a user in my sign-in logs. Why is that happening?
9490
answer: |
95-
Azure AD may redact part of an IP address in the sign in logs to protect user privacy when a user may not belong to the tenant viewing the logs. This happens in two cases: first, during cross tenant sign ins, such as when a CSP technician signs into a tenant that CSP manages. Second, when our service was not able to determine the user's identity with sufficient confidence to be sure the user belongs to the tenant viewing the logs.
91+
Azure AD may redact part of an IP address in the sign-in logs to protect user privacy when a user may not belong to the tenant viewing the logs. This action happens in two cases: first, during cross tenant sign ins, such as when a CSP technician signs into a tenant that CSP manages. Second, when our service wasn't able to determine the user's identity with sufficient confidence to be sure the user belongs to the tenant viewing the logs.
9692
9793
- name: Conditional Access
9894
questions:
@@ -107,7 +103,7 @@ sections:
107103
To get started:
108104
109105
* Navigate to the sign-ins report in the [Azure portal](https://portal.azure.com).
110-
* Click on the sign-in that you want to troubleshoot.
106+
* Select the sign-in that you want to troubleshoot.
111107
* Navigate to the **Conditional Access** tab.
112108
Here, you can view all the policies that impacted the sign-in and the result for each policy.
113109
@@ -116,8 +112,8 @@ sections:
116112
answer: |
117113
Conditional Access status can have the following values:
118114
119-
* **Not Applied**: This means that there was no Conditional Access policy with the user and app in scope.
120-
* **Success**: This means that there was a Conditional Access policy with the user and app in scope and Conditional Access policies were successfully satisfied.
115+
* **Not Applied**: There was no Conditional Access policy with the user and app in scope.
116+
* **Success**: There was a Conditional Access policy with the user and app in scope and Conditional Access policies were successfully satisfied.
121117
* **Failure**: The sign-in satisfied the user and application condition of at least one Conditional Access policy and grant controls are either not satisfied or set to block access.
122118
123119
- question: |
@@ -126,14 +122,14 @@ sections:
126122
A Conditional Access policy can have the following results:
127123
128124
* **Success**: The policy was successfully satisfied.
129-
* **Failure**: The policy was not satisfied.
130-
* **Not applied**: This might be because the policy conditions did not meet.
131-
* **Not enabled**: This is due to the policy in disabled state.
125+
* **Failure**: The policy wasn't satisfied.
126+
* **Not applied**: The policy conditions may not have been met.
127+
* **Not enabled**: The policy may be in a disabled state.
132128
133129
- question: |
134-
The policy name in the all sign-in report does not match the policy name in CA. Why?
130+
The policy name in the all sign-in report doesn't match the policy name in Conditional Access. Why?
135131
answer: |
136-
The policy name in the all sign-in report is based on the Conditional Access policy name at the time of the sign-in. This can be inconsistent with the policy name in CA if you updated the policy name later, that is, after the sign-in.
132+
The policy name in the all sign-in report is based on the Conditional Access (CA) policy name at the time of the sign-in. The name can be inconsistent with the policy name in CA if you updated the policy name later, that is, after the sign-in.
137133
138134
- question: |
139135
My sign-in was blocked due to a Conditional Access policy, but the sign-in activity report shows that the sign-in succeeded. Why?

0 commit comments

Comments
 (0)