Skip to content

Commit bfdb371

Browse files
committed
updating
1 parent b708c8a commit bfdb371

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/active-directory/hybrid/how-to-connect-health-adfs-risky-ip-workbook.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ The risky IP workbook analyzes data from ADFSSignInLogs to help you detect passw
5454
- Sign in details and error counts by IP allows a detailed filtered view by IP or user, to expand on the details table.
5555

5656
Each item in the Risky IP report table shows aggregated information about failed AD FS sign-in activities which exceed designated threshold. It provides the following information:
57-
[![Screenshot that shows a Risky IP report with column headers highlighted.](./media/how-to-connect-health-adfs-risky-ip-workbook/risky-ip-table.png)](./media/how-to-connect-health-adfs-risky-ip-workbook/risky-ip-table.png#lightbox)
57+
[![Screenshot that shows a Risky IP report with column headers highlighted.](./media/how-to-connect-health-adfs-risky-ip-workbook/risky-ip-table-1.png)](./media/how-to-connect-health-adfs-risky-ip-workbook/risky-ip-table-1.png#lightbox)
5858

5959
| Report Item | Description |
6060
| ------- | ----------- |
@@ -83,7 +83,7 @@ Alerting threshold can be updated through Threshold Settings. To start with, sys
8383
**Hour or Day** detection window length can be configured through the toggle button above the filters for customizing thresholds.
8484

8585
## Configure notification alerts using Azure Monitor Alerts through the Azure Portal:
86-
86+
[![Azure Alerts Rule](./media/how-to-connect-health-adfs-risky-ip-workbook/azure-alerts-rule-1.png)](./media/how-to-connect-health-adfs-risky-ip-workbook/azure-alerts-rule-1.png#lightbox)
8787
1. In the Azure Portal, search for “Monitor” in the search bar to navigate to the Azure “Monitor” service. Select “Alerts” from the left menu, then “+ New alert rule”.
8888
2. On the “Create alert rule” blade:
8989
* Scope: Click “Select resource” and select your Log Analytics workspace that contains the ADFSSignInLogs you wish to monitor.

0 commit comments

Comments
 (0)