You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When a user signs in with MFA, several separate MFA events are actually taking place. For example, if a user enters the wrong validation code or doesn't respond in time, additional MFA events are sent to reflect the latest status of the sign-in attempt. These sign-in events appear as one line item in the Azure AD sign-in logs. That same sign-in event in Azure Monitor, however, appears as multiple line items. These events all have the same `correlationId`.
111
+
108
112
### Non-interactive user sign-ins
109
113
110
-
Like interactive user sign-ins, non-interactive sign-ins are done on behalf of a user. These sign-ins were performed by a client app or OS components on behalf of a user and don't require the user to provide an authentication factor. Instead, the device or client app uses a token or code to authenticate or access a resource on behalf of a user. In general, the user will perceive these sign-ins as happening in the background.
114
+
Like interactive user sign-ins, non-interactive sign-ins are done on behalf of a user. These sign-ins were performed by a client app or OS components on behalf of a user and don't require the user to provide an authentication factor. Instead, the device or client app uses a token or code to authenticate or access a resource on behalf of a user. In general, the user perceives these sign-ins as happening in the background.
111
115
112
116
**Report size:** Large </br>
113
117
**Examples:**
@@ -128,7 +132,7 @@ You can't customize the fields shown in this report.
128
132
129
133
To make it easier to digest the data, non-interactive sign-in events are grouped. Clients often create many non-interactive sign-ins on behalf of the same user in a short time period. The non-interactive sign-ins share the same characteristics except for the time the sign-in was attempted. For example, a client may get an access token once per hour on behalf of a user. If the state of the user or client doesn't change, the IP address, resource, and all other information is the same for each access token request. The only state that does change is the date and time of the sign-in.
130
134
131
-
When Azure AD logs multiple sign-ins that are identical other than time and date, those sign-ins will be from the same entity and are aggregated into a single row. A row with multiple identical sign-ins (except for date and time issued) will have a value greater than 1 in the *# sign-ins* column. These aggregated sign-ins may also appear to have the same time stamps. The **Time aggregate** filter can set to 1 hour, 6 hours, or 24 hours. You can expand the row to see all the different sign-ins and their different time stamps.
135
+
When Azure AD logs multiple sign-ins that are identical other than time and date, those sign-ins are from the same entity and are aggregated into a single row. A row with multiple identical sign-ins (except for date and time issued) have a value greater than 1 in the *# sign-ins* column. These aggregated sign-ins may also appear to have the same time stamps. The **Time aggregate** filter can set to 1 hour, 6 hours, or 24 hours. You can expand the row to see all the different sign-ins and their different time stamps.
132
136
133
137
Sign-ins are aggregated in the non-interactive users when the following data matches:
134
138
@@ -142,7 +146,7 @@ The IP address of non-interactive sign-ins doesn't match the actual source IP of
142
146
143
147
### Service principal sign-ins
144
148
145
-
Unlike interactive and non-interactive user sign-ins, service principal sign-ins don't involve a user. Instead, they're sign-ins by any non-user account, such as apps or service principals (except managed identity sign-in, which are in included only in the managed identity sign-in log). In these sign-ins, the app or service provides its own credential, such as a certificate or app secret to authenticate or access resources.
149
+
Unlike interactive and non-interactive user sign-ins, service principal sign-ins don't involve a user. Instead, they're sign-ins by any nonuser account, such as apps or service principals (except managed identity sign-in, which are in included only in the managed identity sign-in log). In these sign-ins, the app or service provides its own credential, such as a certificate or app secret to authenticate or access resources.
146
150
147
151
148
152
**Report size:** Large </br>
@@ -187,7 +191,7 @@ Select the **Add filters** option from the top of the table to get started.
187
191
188
192

189
193
190
-
There are several filter options to choose from. Below are some notable options and details.
194
+
There are several filter options to choose from:
191
195
192
196
-**User:** The *user principal name* (UPN) of the user in question.
193
197
-**Status:** Options are *Success*, *Failure*, and *Interrupted*.
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/concept-sign-ins.md
+8-4Lines changed: 8 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.topic: conceptual
9
9
ms.workload: identity
10
10
ms.subservice: report-monitor
11
-
ms.date: 01/12/2023
11
+
ms.date: 03/24/2023
12
12
ms.author: sarahlipsey
13
13
ms.reviewer: besiler
14
14
ms.collection: M365-identity-device-management
@@ -81,7 +81,7 @@ Select the **Add filters** option from the top of the table to get started.
81
81
82
82

83
83
84
-
There are several filter options to choose from. Below are some notable options and details.
84
+
There are several filter options to choose from:
85
85
86
86
-**User:** The *user principal name* (UPN) of the user in question.
87
87
-**Status:** Options are *Success*, *Failure*, and *Interrupted*.
@@ -90,7 +90,7 @@ There are several filter options to choose from. Below are some notable options
90
90
-*Not applied:* No policy applied to the user and application during sign-in.
91
91
-*Success:* One or more CA policies applied to the user and application (but not necessarily the other conditions) during sign-in.
92
92
-*Failure:* The sign-in satisfied the user and application condition of at least one CA policy and grant controls are either not satisfied or set to block access.
93
-
-**IP addresses:** There is no definitive connection between an IP address and where the computer with that address is physically located. Mobile providers and VPNs issue IP addresses from central pools that are often far from where the client device is actually used. Currently, converting IP address to a physical location is a best effort based on traces, registry data, reverse lookups and other information.
93
+
-**IP addresses:** There's no definitive connection between an IP address and where the computer with that address is physically located. Mobile providers and VPNs issue IP addresses from central pools that are often far from where the client device is actually used. Currently, converting IP address to a physical location is a best effort based on traces, registry data, reverse lookups and other information.
94
94
95
95
The following table provides the options and descriptions for the **Client app** filter option.
96
96
@@ -122,7 +122,7 @@ Now that your sign-in logs table is formatted appropriately, you can more effect
122
122
123
123
### Sign-in error codes
124
124
125
-
If a sign-in failed, you can get more information about the reason in the **Basic info** section of the related log item. The error code and associated failure reason appear in the details. Because of the complexity of some Azure AD environments, we cannot document every possible error code and resolution. Some errors may require [submitting a support request](../fundamentals/how-to-get-support.md) to resolve the issue.
125
+
If a sign-in failed, you can get more information about the reason in the **Basic info** section of the related log item. The error code and associated failure reason appear in the details. Because of the complexity of some Azure AD environments, we can't document every possible error code and resolution. Some errors may require [submitting a support request](../fundamentals/how-to-get-support.md) to resolve the issue.
126
126
127
127

128
128
@@ -159,6 +159,10 @@ When analyzing authentication details, take note of the following details:
159
159
- The **Primary authentication** row isn't initially logged.
160
160
- If you're unsure of a detail in the logs, gather the **Request ID** and **Correlation ID** to use for further analyzing or troubleshooting.
161
161
162
+
#### Considerations for MFA sign-ins
163
+
164
+
When a user signs in with MFA, several separate MFA events are actually taking place. For example, if a user enters the wrong validation code or doesn't respond in time, additional MFA events are sent to reflect the latest status of the sign-in attempt. These sign-in events appear as one line item in the Azure AD sign-in logs. That same sign-in event in Azure Monitor, however, appears as multiple line items. These events all have the same `correlationId`.
165
+
162
166
## Sign-in data used by other services
163
167
164
168
Sign-in data is used by several services in Azure to monitor risky sign-ins and provide insight into application usage.
0 commit comments