Skip to content

Commit b2d6181

Browse files
committed
workbooks-100323
1 parent 330a927 commit b2d6181

15 files changed

+100
-159
lines changed
Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,17 @@
1+
---
2+
title: how to access workbooks
3+
description: include file Microsoft Entra workbook instructions
4+
author: shlipsey3
5+
manager: amycolannino
6+
ms.service: active-directory
7+
ms.workload: identity
8+
ms.topic: include
9+
ms.date: 10/03/2023
10+
ms.author: sarahlipsey
11+
ms.custom: include file
12+
---
13+
14+
There are several prerequisites for accessing Microsoft Entra workbooks. You must have the appropriate Microsoft Entra *and* Azure Monitor roles. You must also have a Log Analytics workspace *and* access to that workspace. For more information, see [How to use Microsoft Entra workbooks](./howto-use-workbooks.md#prerequisites).
15+
16+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) using the appropriate combination of roles.
17+
1. Browse to **Identity** > **Monitoring & health** > **Workbooks**.
Loading
Loading
Loading

articles/active-directory/reports-monitoring/workbook-authentication-prompts-analysis.md

Lines changed: 11 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -9,25 +9,21 @@ ms.service: active-directory
99
ms.topic: reference
1010
ms.workload: identity
1111
ms.subservice: report-monitor
12-
ms.date: 11/01/2022
12+
ms.date: 10/03/2023
1313
ms.author: sarahlipsey
1414
ms.reviewer: sarbar
15-
16-
ms.collection: M365-identity-device-management
1715
---
1816

1917
# Authentication prompts analysis workbook
2018

21-
As an IT Pro, you want the right information about authentication prompts in your environment so that you can detect unexpected prompts and investigate further. Providing you with this type of information is the goal of the **authentication prompts analysis workbook**.
22-
23-
This article provides you with an overview of this workbook.
19+
As an IT Pro, you want the right information about authentication prompts in your environment so that you can detect unexpected prompts and investigate further. Providing you with this type of information is the goal of the **Authentication Prompts Analysis** workbook.
2420

21+
This article provides you with an overview of **Authentication Prompts Analysis** workbook.
2522

2623
## Description
2724

2825
![Workbook category](./media/workbook-authentication-prompts-analysis/workbook-category.png)
2926

30-
3127
Have you recently heard of complaints from your users about getting too many authentication prompts?
3228

3329
Overprompting users can affect your user's productivity and often leads users getting phished for MFA. To be clear, MFA is essential! We are not talking about if you should require MFA but how frequently you should prompt your users.
@@ -47,8 +43,10 @@ You can use this workbook in the following scenarios:
4743
- To view authentication prompt counts of high-profile users.
4844
- To track legacy TLS and other authentication process details.
4945

50-
51-
46+
## How to access the workbook
47+
48+
[!INCLUDE [how to access workbooks](~/articles/active-directory/includes/how-to-access-workbooks.md)]
49+
3. Select the **Authentication Prompts Analysis** workbook from the **Usage** section.
5250

5351
## Sections
5452

@@ -63,59 +61,40 @@ This workbook breaks down authentication prompts by:
6361
- Process detail
6462
- Policy
6563

66-
6764
![Authentication prompts by authentication method](./media/workbook-authentication-prompts-analysis/authentication-prompts-by-authentication-method.png)
6865

69-
70-
7166
In many environments, the most used apps are business productivity apps. Anything that isn’t expected should be investigated. The charts below show authentication prompts by application.
7267

73-
74-
7568
![Authentication prompts by application](./media/workbook-authentication-prompts-analysis/authentication-prompts-by-application.png)
7669

7770
The prompts by application list view shows additional information such as timestamps, and request IDs that help with investigations.
7871

7972
Additionally, you get a summary of the average and median prompts count for your tenant.
8073

81-
8274
![Prompts by application](./media/workbook-authentication-prompts-analysis/prompts-by-authentication-method.png)
8375

84-
8576
This workbook also helps track impactful ways to improve your users’ experience and reduce prompts and the relative percentage.
8677

87-
8878
![Recommendations for reducing prompts](./media/workbook-authentication-prompts-analysis/recommendations-for-reducing-prompts.png)
8979

9080

91-
92-
9381
## Filters
9482

95-
9683
Take advantage of the filters for more granular views of the data:
9784

98-
9985
![Filter](./media/workbook-authentication-prompts-analysis/filters.png)
10086

10187
Filtering for a specific user that has many authentication requests or only showing applications with sign-in failures can also lead to interesting findings to continue to remediate.
10288

10389
## Best practices
10490

91+
- If data isn't showing up or seems to be showing up incorrectly, confirm that you have set the **Log Analytics Workspace** and **Subscriptions** on the proper resources.
10592

106-
If data isn't showing up or seems to be showing up incorrectly, confirm that you have set the **Log Analytics Workspace** and **Subscriptions** on the proper resources.
107-
108-
109-
![Set workspace and subscriptions](./media/workbook-authentication-prompts-analysis/workspace-and-subscriptions.png)
110-
111-
If the visuals are taking too much time to load, try reducing the Time filter to 24 hours or less.
112-
113-
![Set filter](./media/workbook-authentication-prompts-analysis/set-filter.png)
114-
115-
93+
![Set workspace and subscriptions](./media/workbook-authentication-prompts-analysis/workspace-and-subscriptions.png)
11694

95+
- If the visuals are taking too much time to load, try reducing the Time filter to 24 hours or less.
11796

118-
## Next steps
97+
![Set filter](./media/workbook-authentication-prompts-analysis/set-filter.png)
11998

12099
- To understand more about the different policies that affect MFA prompts, see [Optimize reauthentication prompts and understand session lifetime for Microsoft Entra multifactor authentication](../authentication/concepts-azure-multi-factor-authentication-prompts-session-lifetime.md).
121100

articles/active-directory/reports-monitoring/workbook-conditional-access-gap-analyzer.md

Lines changed: 8 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -9,19 +9,18 @@ ms.service: active-directory
99
ms.topic: reference
1010
ms.workload: identity
1111
ms.subservice: report-monitor
12-
ms.date: 11/01/2022
12+
ms.date: 10/03/2023
1313
ms.author: sarahlipsey
1414
ms.reviewer: sarbar
1515

16-
ms.collection: M365-identity-device-management
1716
---
1817

1918
# Conditional Access gap analyzer workbook
2019

2120
In Microsoft Entra ID, you can protect access to your resources by configuring Conditional Access policies.
2221
As an IT administrator, you want to ensure that your Conditional Access policies work as expected to ensure that your resources are properly protected. With the Conditional Access gap analyzer workbook, you can detect gaps in your Conditional Access implementation.
2322

24-
This article provides you with an overview of this workbook.
23+
This article provides you with an overview of the **Conditional Access gap analyzer** workbook.
2524

2625

2726
## Description
@@ -37,12 +36,14 @@ The Conditional Access gap analyzer workbook helps you to verify that your Condi
3736
- Highlights user sign-ins that have no Conditional Access policies applied to them.
3837
- Allows you to ensure that there are no users, applications, or locations that have been unintentionally excluded from Conditional Access policies.
3938

40-
39+
## How to access the workbook
4140

42-
## Sections
41+
[!INCLUDE [how to access workbooks](~/articles/active-directory/includes/how-to-access-workbooks.md)]
42+
3. Select the **Conditional Access Gap Analyzer** workbook from the **Conditional Access** section.
4343

44+
## Sections
4445

45-
The workbook has four sections:
46+
The workbook has four sections:
4647

4748
- Users signing in using legacy authentication
4849

@@ -63,8 +64,6 @@ This workbook supports setting a time range filter.
6364

6465
![Time range filter](./media/workbook-conditional-access-gap-analyzer/time-range.png)
6566

66-
67-
6867
## Best practices
6968

7069
Use this workbook to ensure that your tenant is configured to the following Conditional Access best practices:
@@ -75,14 +74,4 @@ Use this workbook to ensure that your tenant is configured to the following Cond
7574

7675
- Block all high risk sign-ins
7776

78-
- Block sign-ins from untrusted locations
79-
80-
81-
82-
83-
84-
85-
86-
## Next steps
87-
88-
- [How to use Microsoft Entra workbooks](howto-use-azure-monitor-workbooks.md)
77+
- Block sign-ins from untrusted locations

0 commit comments

Comments
 (0)