You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/conditional-access/howto-continuous-access-evaluation-troubleshoot.md
+10-14Lines changed: 10 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: conditional-access
8
8
ms.topic: troubleshooting
9
-
ms.date: 01/05/2023
9
+
ms.date: 04/03/2023
10
10
11
11
ms.author: joflore
12
12
author: MicrosoftGuyJFlo
@@ -21,21 +21,21 @@ Administrators can monitor and troubleshoot sign in events where [continuous acc
21
21
22
22
## Continuous access evaluation sign-in reporting
23
23
24
-
Administrators will have the opportunity to monitor user sign-ins where CAE is applied. This pane can be located by via the following instructions:
24
+
Administrators can monitor user sign-ins where continuous access evaluation (CAE) is applied. This information is found in the Azure AD sign-in logs:
25
25
26
26
1. Sign in to the **Azure portal** as a Conditional Access Administrator, Security Administrator, or Global Administrator.
27
-
1. Browse to **Azure Active Directory** > **Sign-ins**.
27
+
1. Browse to **Azure Active Directory** > **Sign-in logs**.
28
28
1. Apply the **Is CAE Token** filter.
29
29
30
-
[](./media/howto-continuous-access-evaluation-troubleshoot/azure-ad-sign-ins-log-apply-filter.png#lightbox)
30
+
[](./media/howto-continuous-access-evaluation-troubleshoot/sign-ins-log-apply-filter.png#lightbox)
31
31
32
-
From here, admins will be presented with information about their user’s sign-in events. Select any sign-in to see details about the session, like which Conditional Access policies were applied and is CAE enabled.
32
+
From here, admins are presented with information about their user’s sign-in events. Select any sign-in to see details about the session, like which Conditional Access policies applied and if CAE enabled.
33
33
34
-
There are multiple sign-in requests for each authentication. Some will be shown on the interactive tab, while others will be shown on the non-interactive tab. CAE will only be displayed as true for one of the requests, and it can be on the interactive tab or non-interactive tab. Admins need to check both tabs to confirm whether the user's authentication is CAE enabled or not.
34
+
There are multiple sign-in requests for each authentication. Some are on the interactive tab, while others are on the non-interactive tab. CAE is only marked true for one of the requests, it can be on the interactive tab or non-interactive tab. Admins must check both tabs to confirm whether the user's authentication is CAE enabled or not.
35
35
36
36
### Searching for specific sign-in attempts
37
37
38
-
Sign in logs contain information on Success as well as failure events. Use filters to narrow your search. For example, if a user signed in to Teams, use the Application filter and set it to Teams. Admins may need to check the sign-ins from both interactive and non-interactive tabs to locate the specific sign-in. To further narrow the search, admins may apply multiple filters.
38
+
Sign in logs contain information on success and failure events. Use filters to narrow your search. For example, if a user signed in to Teams, use the Application filter and set it to Teams. Admins may need to check the sign-ins from both interactive and non-interactive tabs to locate the specific sign-in. To further narrow the search, admins may apply multiple filters.
39
39
40
40
## Continuous access evaluation workbooks
41
41
@@ -49,33 +49,29 @@ Log Analytics integration must be completed before workbooks are displayed. For
49
49
1. Browse to **Azure Active Directory** > **Workbooks**.
50
50
1. Under **Public Templates**, search for **Continuous access evaluation insights**.
51
51
52
-
[](./media/howto-continuous-access-evaluation-troubleshoot/azure-ad-workbooks-continuous-access-evaluation.png#lightbox)
53
-
54
52
The **Continuous access evaluation insights** workbook contains the following table:
55
53
56
54
### Potential IP address mismatch between Azure AD and resource provider
57
55
58
-

59
-
60
56
The potential IP address mismatch between Azure AD & resource provider table allows admins to investigate sessions where the IP address detected by Azure AD doesn't match with the IP address detected by the resource provider.
61
57
62
58
This workbook table sheds light on these scenarios by displaying the respective IP addresses and whether a CAE token was issued during the session.
63
59
64
-
####Continuous access evaluation insights per sign-in
60
+
### Continuous access evaluation insights per sign-in
65
61
66
62
The continuous access evaluation insights per sign-in page in the workbook connects multiple requests from the sign-in logs and displays a single request where a CAE token was issued.
67
63
68
64
This workbook can come in handy, for example, when: A user opens Outlook on their desktop and attempts to access resources inside of Exchange Online. This sign-in action may map to multiple interactive and non-interactive sign-in requests in the logs making issues hard to diagnose.
69
65
70
-
####IP address configuration
66
+
## IP address configuration
71
67
72
68
Your identity provider and resource providers may see different IP addresses. This mismatch may happen because of the following examples:
73
69
74
70
- Your network implements split tunneling.
75
71
- Your resource provider is using an IPv6 address and Azure AD is using an IPv4 address.
76
72
- Because of network configurations, Azure AD sees one IP address from the client and your resource provider sees a different IP address from the client.
77
73
78
-
If this scenario exists in your environment, to avoid infinite loops, Azure AD will issue a one-hour CAE token and won't enforce client location change during that one-hour period. Even in this case, security is improved compared to traditional one-hour tokens since we're still evaluating the other events besides client location change events.
74
+
If this scenario exists in your environment, to avoid infinite loops, Azure AD issues a one-hour CAE token and doesn't enforce client location change during that one-hour period. Even in this case, security is improved compared to traditional one-hour tokens since we're still evaluating the other events besides client location change events.
79
75
80
76
Admins can view records filtered by time range and application. Admins can compare the number of mismatched IPs detected with the total number of sign-ins during a specified time period.
0 commit comments