You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
description: include file Microsoft Entra workbook instructions
4
+
author: shlipsey3
5
+
manager: amycolannino
6
+
ms.service: active-directory
7
+
ms.workload: identity
8
+
ms.topic: include
9
+
ms.date: 10/03/2023
10
+
ms.author: sarahlipsey
11
+
ms.custom: include file
12
+
---
13
+
14
+
There are several prerequisites for accessing Microsoft Entra workbooks. You must have the appropriate Microsoft Entra *and* Azure Monitor roles. You must also have a Log Analytics workspace *and* access to that workspace. For more information, see [How to use Microsoft Entra workbooks](./howto-use-workbooks.md#prerequisites).
15
+
16
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) using the appropriate combination of roles.
17
+
1. Browse to **Identity** > **Monitoring & health** > **Workbooks**.
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/workbook-authentication-prompts-analysis.md
+11-32Lines changed: 11 additions & 32 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,25 +9,21 @@ ms.service: active-directory
9
9
ms.topic: reference
10
10
ms.workload: identity
11
11
ms.subservice: report-monitor
12
-
ms.date: 11/01/2022
12
+
ms.date: 10/03/2023
13
13
ms.author: sarahlipsey
14
14
ms.reviewer: sarbar
15
-
16
-
ms.collection: M365-identity-device-management
17
15
---
18
16
19
17
# Authentication prompts analysis workbook
20
18
21
-
As an IT Pro, you want the right information about authentication prompts in your environment so that you can detect unexpected prompts and investigate further. Providing you with this type of information is the goal of the **authentication prompts analysis workbook**.
22
-
23
-
This article provides you with an overview of this workbook.
19
+
As an IT Pro, you want the right information about authentication prompts in your environment so that you can detect unexpected prompts and investigate further. Providing you with this type of information is the goal of the **Authentication Prompts Analysis** workbook.
24
20
21
+
This article provides you with an overview of **Authentication Prompts Analysis** workbook.
Have you recently heard of complaints from your users about getting too many authentication prompts?
32
28
33
29
Overprompting users can affect your user's productivity and often leads users getting phished for MFA. To be clear, MFA is essential! We are not talking about if you should require MFA but how frequently you should prompt your users.
@@ -47,8 +43,10 @@ You can use this workbook in the following scenarios:
47
43
- To view authentication prompt counts of high-profile users.
48
44
- To track legacy TLS and other authentication process details.
49
45
50
-
51
-
46
+
## How to access the workbook
47
+
48
+
[!INCLUDE [how to access workbooks](~/articles/active-directory/includes/how-to-access-workbooks.md)]
49
+
3. Select the **Authentication Prompts Analysis** workbook from the **Usage** section.
52
50
53
51
## Sections
54
52
@@ -63,59 +61,40 @@ This workbook breaks down authentication prompts by:
63
61
- Process detail
64
62
- Policy
65
63
66
-
67
64

68
65
69
-
70
-
71
66
In many environments, the most used apps are business productivity apps. Anything that isn’t expected should be investigated. The charts below show authentication prompts by application.
72
67
73
-
74
-
75
68

76
69
77
70
The prompts by application list view shows additional information such as timestamps, and request IDs that help with investigations.
78
71
79
72
Additionally, you get a summary of the average and median prompts count for your tenant.
80
73
81
-
82
74

83
75
84
-
85
76
This workbook also helps track impactful ways to improve your users’ experience and reduce prompts and the relative percentage.
86
77
87
-
88
78

89
79
90
80
91
-
92
-
93
81
## Filters
94
82
95
-
96
83
Take advantage of the filters for more granular views of the data:
Filtering for a specific user that has many authentication requests or only showing applications with sign-in failures can also lead to interesting findings to continue to remediate.
102
88
103
89
## Best practices
104
90
91
+
- If data isn't showing up or seems to be showing up incorrectly, confirm that you have set the **Log Analytics Workspace** and **Subscriptions** on the proper resources.
105
92
106
-
If data isn't showing up or seems to be showing up incorrectly, confirm that you have set the **Log Analytics Workspace** and **Subscriptions** on the proper resources.
107
-
108
-
109
-

110
-
111
-
If the visuals are taking too much time to load, try reducing the Time filter to 24 hours or less.
- To understand more about the different policies that affect MFA prompts, see [Optimize reauthentication prompts and understand session lifetime for Microsoft Entra multifactor authentication](../authentication/concepts-azure-multi-factor-authentication-prompts-session-lifetime.md).
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/workbook-conditional-access-gap-analyzer.md
+8-19Lines changed: 8 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,19 +9,18 @@ ms.service: active-directory
9
9
ms.topic: reference
10
10
ms.workload: identity
11
11
ms.subservice: report-monitor
12
-
ms.date: 11/01/2022
12
+
ms.date: 10/03/2023
13
13
ms.author: sarahlipsey
14
14
ms.reviewer: sarbar
15
15
16
-
ms.collection: M365-identity-device-management
17
16
---
18
17
19
18
# Conditional Access gap analyzer workbook
20
19
21
20
In Microsoft Entra ID, you can protect access to your resources by configuring Conditional Access policies.
22
21
As an IT administrator, you want to ensure that your Conditional Access policies work as expected to ensure that your resources are properly protected. With the Conditional Access gap analyzer workbook, you can detect gaps in your Conditional Access implementation.
23
22
24
-
This article provides you with an overview of this workbook.
23
+
This article provides you with an overview of the **Conditional Access gap analyzer** workbook.
25
24
26
25
27
26
## Description
@@ -37,12 +36,14 @@ The Conditional Access gap analyzer workbook helps you to verify that your Condi
37
36
- Highlights user sign-ins that have no Conditional Access policies applied to them.
38
37
- Allows you to ensure that there are no users, applications, or locations that have been unintentionally excluded from Conditional Access policies.
39
38
40
-
39
+
## How to access the workbook
41
40
42
-
## Sections
41
+
[!INCLUDE [how to access workbooks](~/articles/active-directory/includes/how-to-access-workbooks.md)]
42
+
3. Select the **Conditional Access Gap Analyzer** workbook from the **Conditional Access** section.
43
43
44
+
## Sections
44
45
45
-
The workbook has four sections:
46
+
The workbook has four sections:
46
47
47
48
- Users signing in using legacy authentication
48
49
@@ -63,8 +64,6 @@ This workbook supports setting a time range filter.
63
64
64
65

65
66
66
-
67
-
68
67
## Best practices
69
68
70
69
Use this workbook to ensure that your tenant is configured to the following Conditional Access best practices:
@@ -75,14 +74,4 @@ Use this workbook to ensure that your tenant is configured to the following Cond
75
74
76
75
- Block all high risk sign-ins
77
76
78
-
- Block sign-ins from untrusted locations
79
-
80
-
81
-
82
-
83
-
84
-
85
-
86
-
## Next steps
87
-
88
-
-[How to use Microsoft Entra workbooks](howto-use-azure-monitor-workbooks.md)
0 commit comments