Skip to content

Commit c2d98c4

Browse files
Merge pull request #231223 from shlipsey3/reports-clarify-mfa-031723
reports-clarify-mfa-031723
2 parents dd1c5c7 + 86f7660 commit c2d98c4

File tree

2 files changed

+19
-11
lines changed

2 files changed

+19
-11
lines changed

articles/active-directory/reports-monitoring/concept-all-sign-ins.md

Lines changed: 11 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
2-
title: Sign-in logs (preview) in Azure Active Directory
3-
description: Conceptual information about Azure AD sign-in logs, including new features in preview.
2+
title: Sign-in logs (preview)
3+
description: Conceptual information about sign-in logs, including new features in preview.
44
services: active-directory
55
author: shlipsey3
66
manager: amycolannino
77
ms.service: active-directory
88
ms.topic: conceptual
99
ms.workload: identity
1010
ms.subservice: report-monitor
11-
ms.date: 01/12/2023
11+
ms.date: 03/24/2023
1212
ms.author: sarahlipsey
1313
ms.reviewer: besiler
1414
ms.collection: M365-identity-device-management
@@ -105,9 +105,13 @@ You can customize the list view by clicking **Columns** in the toolbar.
105105

106106
![Screenshot customize columns button.](./media/concept-all-sign-ins/sign-in-logs-columns-preview.png)
107107

108+
#### Considerations for MFA sign-ins
109+
110+
When a user signs in with MFA, several separate MFA events are actually taking place. For example, if a user enters the wrong validation code or doesn't respond in time, additional MFA events are sent to reflect the latest status of the sign-in attempt. These sign-in events appear as one line item in the Azure AD sign-in logs. That same sign-in event in Azure Monitor, however, appears as multiple line items. These events all have the same `correlationId`.
111+
108112
### Non-interactive user sign-ins
109113

110-
Like interactive user sign-ins, non-interactive sign-ins are done on behalf of a user. These sign-ins were performed by a client app or OS components on behalf of a user and don't require the user to provide an authentication factor. Instead, the device or client app uses a token or code to authenticate or access a resource on behalf of a user. In general, the user will perceive these sign-ins as happening in the background.
114+
Like interactive user sign-ins, non-interactive sign-ins are done on behalf of a user. These sign-ins were performed by a client app or OS components on behalf of a user and don't require the user to provide an authentication factor. Instead, the device or client app uses a token or code to authenticate or access a resource on behalf of a user. In general, the user perceives these sign-ins as happening in the background.
111115

112116
**Report size:** Large </br>
113117
**Examples:**
@@ -128,7 +132,7 @@ You can't customize the fields shown in this report.
128132

129133
To make it easier to digest the data, non-interactive sign-in events are grouped. Clients often create many non-interactive sign-ins on behalf of the same user in a short time period. The non-interactive sign-ins share the same characteristics except for the time the sign-in was attempted. For example, a client may get an access token once per hour on behalf of a user. If the state of the user or client doesn't change, the IP address, resource, and all other information is the same for each access token request. The only state that does change is the date and time of the sign-in.
130134

131-
When Azure AD logs multiple sign-ins that are identical other than time and date, those sign-ins will be from the same entity and are aggregated into a single row. A row with multiple identical sign-ins (except for date and time issued) will have a value greater than 1 in the *# sign-ins* column. These aggregated sign-ins may also appear to have the same time stamps. The **Time aggregate** filter can set to 1 hour, 6 hours, or 24 hours. You can expand the row to see all the different sign-ins and their different time stamps.
135+
When Azure AD logs multiple sign-ins that are identical other than time and date, those sign-ins are from the same entity and are aggregated into a single row. A row with multiple identical sign-ins (except for date and time issued) have a value greater than 1 in the *# sign-ins* column. These aggregated sign-ins may also appear to have the same time stamps. The **Time aggregate** filter can set to 1 hour, 6 hours, or 24 hours. You can expand the row to see all the different sign-ins and their different time stamps.
132136

133137
Sign-ins are aggregated in the non-interactive users when the following data matches:
134138

@@ -142,7 +146,7 @@ The IP address of non-interactive sign-ins doesn't match the actual source IP of
142146

143147
### Service principal sign-ins
144148

145-
Unlike interactive and non-interactive user sign-ins, service principal sign-ins don't involve a user. Instead, they're sign-ins by any non-user account, such as apps or service principals (except managed identity sign-in, which are in included only in the managed identity sign-in log). In these sign-ins, the app or service provides its own credential, such as a certificate or app secret to authenticate or access resources.
149+
Unlike interactive and non-interactive user sign-ins, service principal sign-ins don't involve a user. Instead, they're sign-ins by any nonuser account, such as apps or service principals (except managed identity sign-in, which are in included only in the managed identity sign-in log). In these sign-ins, the app or service provides its own credential, such as a certificate or app secret to authenticate or access resources.
146150

147151

148152
**Report size:** Large </br>
@@ -187,7 +191,7 @@ Select the **Add filters** option from the top of the table to get started.
187191

188192
![Screenshot of the sign-in logs page with the Add filters option highlighted.](./media/concept-all-sign-ins/sign-in-logs-filter-preview.png)
189193

190-
There are several filter options to choose from. Below are some notable options and details.
194+
There are several filter options to choose from:
191195

192196
- **User:** The *user principal name* (UPN) of the user in question.
193197
- **Status:** Options are *Success*, *Failure*, and *Interrupted*.

articles/active-directory/reports-monitoring/concept-sign-ins.md

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.topic: conceptual
99
ms.workload: identity
1010
ms.subservice: report-monitor
11-
ms.date: 01/12/2023
11+
ms.date: 03/24/2023
1212
ms.author: sarahlipsey
1313
ms.reviewer: besiler
1414
ms.collection: M365-identity-device-management
@@ -81,7 +81,7 @@ Select the **Add filters** option from the top of the table to get started.
8181

8282
![Screenshot of the sign-in logs page with the Add filters option highlighted.](./media/concept-sign-ins/sign-in-logs-filter.png)
8383

84-
There are several filter options to choose from. Below are some notable options and details.
84+
There are several filter options to choose from:
8585

8686
- **User:** The *user principal name* (UPN) of the user in question.
8787
- **Status:** Options are *Success*, *Failure*, and *Interrupted*.
@@ -90,7 +90,7 @@ There are several filter options to choose from. Below are some notable options
9090
- *Not applied:* No policy applied to the user and application during sign-in.
9191
- *Success:* One or more CA policies applied to the user and application (but not necessarily the other conditions) during sign-in.
9292
- *Failure:* The sign-in satisfied the user and application condition of at least one CA policy and grant controls are either not satisfied or set to block access.
93-
- **IP addresses:** There is no definitive connection between an IP address and where the computer with that address is physically located. Mobile providers and VPNs issue IP addresses from central pools that are often far from where the client device is actually used. Currently, converting IP address to a physical location is a best effort based on traces, registry data, reverse lookups and other information.
93+
- **IP addresses:** There's no definitive connection between an IP address and where the computer with that address is physically located. Mobile providers and VPNs issue IP addresses from central pools that are often far from where the client device is actually used. Currently, converting IP address to a physical location is a best effort based on traces, registry data, reverse lookups and other information.
9494

9595
The following table provides the options and descriptions for the **Client app** filter option.
9696

@@ -122,7 +122,7 @@ Now that your sign-in logs table is formatted appropriately, you can more effect
122122

123123
### Sign-in error codes
124124

125-
If a sign-in failed, you can get more information about the reason in the **Basic info** section of the related log item. The error code and associated failure reason appear in the details. Because of the complexity of some Azure AD environments, we cannot document every possible error code and resolution. Some errors may require [submitting a support request](../fundamentals/how-to-get-support.md) to resolve the issue.
125+
If a sign-in failed, you can get more information about the reason in the **Basic info** section of the related log item. The error code and associated failure reason appear in the details. Because of the complexity of some Azure AD environments, we can't document every possible error code and resolution. Some errors may require [submitting a support request](../fundamentals/how-to-get-support.md) to resolve the issue.
126126

127127
![Screenshot of a sign-in error code.](./media/concept-sign-ins/error-code.png)
128128

@@ -159,6 +159,10 @@ When analyzing authentication details, take note of the following details:
159159
- The **Primary authentication** row isn't initially logged.
160160
- If you're unsure of a detail in the logs, gather the **Request ID** and **Correlation ID** to use for further analyzing or troubleshooting.
161161

162+
#### Considerations for MFA sign-ins
163+
164+
When a user signs in with MFA, several separate MFA events are actually taking place. For example, if a user enters the wrong validation code or doesn't respond in time, additional MFA events are sent to reflect the latest status of the sign-in attempt. These sign-in events appear as one line item in the Azure AD sign-in logs. That same sign-in event in Azure Monitor, however, appears as multiple line items. These events all have the same `correlationId`.
165+
162166
## Sign-in data used by other services
163167

164168
Sign-in data is used by several services in Azure to monitor risky sign-ins and provide insight into application usage.

0 commit comments

Comments
 (0)