Skip to content

Commit c40435f

Browse files
Merge pull request #216808 from shlipsey3/reports-metadata-updates-110122
troubleshooting-workbooks-updates
2 parents 2c6372f + 19a8313 commit c40435f

10 files changed

+63
-99
lines changed

articles/active-directory/reports-monitoring/troubleshoot-audit-data-verified-domain.md

Lines changed: 11 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -3,32 +3,29 @@
33
title: 'Troubleshoot audit data of verified domain change | Microsoft Docs'
44
description: Provides you with information that will appear in the Azure Active Directory activity logs when you change a users verified domain.
55
services: active-directory
6-
documentationcenter: ''
7-
author: MarkusVi
6+
author: shlipsey3
87
manager: amycolannino
9-
editor: ''
108
ms.service: active-directory
119
ms.topic: troubleshooting
12-
ms.tgt_pltfrm: na
1310
ms.workload: identity
1411
ms.subservice: report-monitor
15-
ms.date: 08/26/2022
16-
ms.author: markvi
12+
ms.date: 11/01/2022
13+
ms.author: sarahlipsey
1714
ms.collection: M365-identity-device-management
1815
---
1916

2017
# Troubleshoot: Audit data on verified domain change
2118

2219

23-
## I have a lot of changes to my users and I am not sure what the cause of it is.
20+
## I have a lot of changes to my users and I'm not sure what the cause of it is.
2421

2522
### Symptoms
2623

27-
I check the Azure AD audit logs, and see multiple user updates occurring in my Azure AD tenant. These **Update User** events do not display **Actor** information, which causes uncertainty as to what/who triggered the mass changes to users.
24+
I check the Azure AD audit logs, and see multiple user updates occurring in my Azure AD tenant. These **Update User** events don't display **Actor** information, which causes uncertainty as to what/who triggered the mass changes to users.
2825

2926
### Cause
3027

31-
A common reason behind mass object changes is a non-synchronous backend operation called **ProxyCalc**. **ProxyCalc** is the logic that determines the appropriate **UserPrincipalName** and **Proxy Addresses**, that are updated in Azure AD users, groups or contacts. The design behind **ProxyCalc** is to ensure that all **UserPrincipalName** and **Proxy Addresses** are consistent in Azure AD at any time. **ProxyCalc** must be triggered by an explicit change like a verified domain change and does not perpetually run in the background as a task.
28+
A common reason behind mass object changes is a non-synchronous backend operation called **ProxyCalc**. **ProxyCalc** is the logic that determines the appropriate **UserPrincipalName** and **Proxy Addresses** that are updated in Azure AD users, groups, or contacts. The design behind **ProxyCalc** is to ensure that all **UserPrincipalName** and **Proxy Addresses** are consistent in Azure AD at any time. **ProxyCalc** must be triggered by an explicit change like a verified domain change and doesn't perpetually run in the background as a task.
3229

3330

3431

@@ -54,17 +51,17 @@ One of the admin tasks that could trigger **ProxyCalc** is whenever there’s a
5451

5552
For example, if you add a verified domain Fabrikam.com to your Contoso.onmicrosoft.com tenant, this action will trigger a ProxyCalc operation on all objects in the tenant. This event will be captured in the Azure AD Audit logs as **Update User** events preceded by an **Add verified domain** event. On the other hand, if Fabrikam.com was removed from the Contoso.onmicrosoft.com tenant, then all the **Update User** events will be preceded by a **Remove verified domain** event.
5653

57-
#### Additional notes:
54+
#### Notes:
5855

59-
ProxyCalc does not cause changes to certain objects that:
56+
ProxyCalc doesn't cause changes to certain objects that:
6057

61-
- do not have an active Exchange license
58+
- don't have an active Exchange license
6259
- have **MSExchRemoteRecipientType** set to Null
63-
- are not considered a shared resource. Shared Resource is when **CloudMSExchRecipientDisplayType** contains one of the following values: **MailboxUser (shared)**, **PublicFolder**, **ConferenceRoomMailbox**, **EquipmentMailbox**, **ArbitrationMailbox**, **RoomList**, **TeamMailboxUser**, **Group mailbox**, **Scheduling mailbox**, **ACLableMailboxUser**, **ACLableTeamMailboxUser**
60+
- aren't considered a shared resource. Shared Resource is when **CloudMSExchRecipientDisplayType** contains one of the following values: **MailboxUser (shared)**, **PublicFolder**, **ConferenceRoomMailbox**, **EquipmentMailbox**, **ArbitrationMailbox**, **RoomList**, **TeamMailboxUser**, **Group mailbox**, **Scheduling mailbox**, **ACLableMailboxUser**, **ACLableTeamMailboxUser**
6461

6562
In order to build more correlation between these two disparate events, Microsoft is working on updating the **Actor** info in the audit logs to identify these changes as triggered by a verified domain change. This action will help check when the verified domain change event took place and started to mass update the objects in their tenant.
6663

67-
Additionally, in most cases, there are no changes to users as their **UserPrincipalName** and **Proxy Addresses** are consistent, so we are working to display in Audit Logs only those updates that caused an actual change to the object. This action will prevent noise in the audit logs and help admins correlate the remaining user changes to verified domain change event as explained above.
64+
Additionally, in most cases, there are no changes to users as their **UserPrincipalName** and **Proxy Addresses** are consistent, so we're working to display in Audit Logs only those updates that caused an actual change to the object. This action will prevent noise in the audit logs and help admins correlate the remaining user changes to verified domain change event as explained above.
6865

6966
## Next Steps
7067

articles/active-directory/reports-monitoring/troubleshoot-graph-api.md

Lines changed: 4 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -3,19 +3,14 @@
33
title: 'Troubleshoot errors in Azure Active Directory reporting API | Microsoft Docs'
44
description: Provides you with a resolution to errors while calling Azure Active Directory Reporting APIs.
55
services: active-directory
6-
documentationcenter: ''
7-
author: MarkusVi
6+
author: shlipsey3
87
manager: amycolannino
9-
editor: ''
10-
11-
ms.assetid: 0030c5a4-16f0-46f4-ad30-782e7fea7e40
128
ms.service: active-directory
139
ms.topic: troubleshooting
14-
ms.tgt_pltfrm: na
1510
ms.workload: identity
1611
ms.subservice: report-monitor
17-
ms.date: 08/26/2022
18-
ms.author: markvi
12+
ms.date: 11/01/2022
13+
ms.author: sarahlipsey
1914
ms.reviewer: dhanyahk
2015

2116
ms.collection: M365-identity-device-management
@@ -37,7 +32,7 @@ Accessing sign-in reports requires an Azure Active Directory premium 1 (P1) lice
3732

3833
If you see this error message while trying to access audit logs or sign-ins using the API, make sure that your account is part of the **Security Reader** or **Report Reader** role in your Azure Active Directory tenant.
3934

40-
### Error: Application missing AAD 'Read directory data' permission
35+
### Error: Application missing Azure AD 'Read directory data' permission
4136

4237
Follow the steps in the [Prerequisites to access the Azure Active Directory reporting API](howto-configure-prerequisites-for-reporting-api.md) to ensure your application is running with the right set of permissions.
4338

articles/active-directory/reports-monitoring/troubleshoot-missing-audit-data.md

Lines changed: 8 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -3,19 +3,14 @@
33
title: 'Troubleshoot Missing data in activity logs | Microsoft Docs'
44
description: Provides you with a resolution to missing data in Azure Active Directory activity logs.
55
services: active-directory
6-
documentationcenter: ''
7-
author: MarkusVi
6+
author: shlipsey3
87
manager: amycolannino
9-
editor: ''
10-
11-
ms.assetid: 7cbe4337-bb77-4ee0-b254-3e368be06db7
128
ms.service: active-directory
139
ms.topic: troubleshooting
14-
ms.tgt_pltfrm: na
1510
ms.workload: identity
1611
ms.subservice: report-monitor
17-
ms.date: 08/26/2022
18-
ms.author: markvi
12+
ms.date: 11/01/2022
13+
ms.author: sarahlipsey
1914
ms.reviewer: dhanyahk
2015

2116
ms.collection: M365-identity-device-management
@@ -27,7 +22,7 @@ ms.collection: M365-identity-device-management
2722

2823
### Symptoms
2924

30-
I performed some actions in the Azure portal and expected to see the audit logs for those actions in the `Activity logs > Audit Logs` blade, but I can’t find them.
25+
I performed some actions in the Azure portal and expected to see the audit logs for those actions in the `Activity logs > Audit Logs`, but I can’t find them.
3126

3227
![Screenshot shows Audit Log entries.](./media/troubleshoot-missing-audit-data/01.png)
3328

@@ -42,13 +37,13 @@ Actions don’t appear immediately in the activity logs. The table below enumera
4237

4338
### Resolution
4439

45-
Wait for 15 minutes to two hours and see if the actions appear in the log. If you don’t see the logs even after two hours, please [file a support ticket](https://portal.azure.com/#blade/Microsoft_Azure_Support/HelpAndSupportBlade/newsupportrequest) and we will look into it.
40+
Wait for 15 minutes to two hours and see if the actions appear in the log. If you don’t see the logs even after two hours, [file a support request,](https://portal.azure.com/#blade/Microsoft_Azure_Support/HelpAndSupportBlade/newsupportrequest) and we'll look into it.
4641

4742
## I can’t find recent user sign-ins in the Azure Active Directory sign-ins activity log
4843

4944
### Symptoms
5045

51-
I recently signed into the Azure portal and expected to see the sign-in logs for those actions in the `Activity logs > Sign-ins` blade, but I can’t find them.
46+
I recently signed into the Azure portal and expected to see the sign-in logs for those actions in the `Activity logs > Sign-ins`, but I can’t find them.
5247

5348
![Screenshot shows Sign-ins in the Activity log.](./media/troubleshoot-missing-audit-data/02.png)
5449

@@ -63,7 +58,7 @@ Actions don’t appear immediately in the activity logs. The table below enumera
6358

6459
### Resolution
6560

66-
Wait for 15 minutes to two hours and see if the actions appear in the log. If you don’t see the logs even after two hours, please [file a support ticket](https://portal.azure.com/#blade/Microsoft_Azure_Support/HelpAndSupportBlade/newsupportrequest) and we will look into it.
61+
Wait for 15 minutes to two hours and see if the actions appear in the log. If you don’t see the logs even after two hours, [file a support request,](https://portal.azure.com/#blade/Microsoft_Azure_Support/HelpAndSupportBlade/newsupportrequest) and we'll look into it.
6762

6863
## I can't view more than 30 days of report data in the Azure portal
6964

@@ -80,7 +75,7 @@ Depending on your license, Azure Active Directory Actions stores activity report
8075
| Report | Azure AD Free | Azure AD Premium P1 | Azure AD Premium P2 |
8176
| --- | --- | --- | --- |
8277
| Directory Audit | 7 days | 30 days | 30 days |
83-
| Sign-in Activity | Not available. You can access your own sign-ins for 7 days from the individual user profile blade | 30 days | 30 days |
78+
| Sign-in Activity | Not available. You can access your own sign-ins for 7 days from the individual user profile | 30 days | 30 days |
8479

8580
For more information, see [Azure Active Directory report retention policies](reference-reports-data-retention.md).
8681

articles/active-directory/reports-monitoring/troubleshoot-missing-data-download.md

Lines changed: 4 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -3,19 +3,14 @@
33
title: 'Troubleshooting: Missing data in the downloaded activity logs | Microsoft Docs'
44
description: Provides you with a resolution to missing data in downloaded Azure Active Directory activity logs.
55
services: active-directory
6-
documentationcenter: ''
7-
author: MarkusVi
6+
author: shlipsey3
87
manager: amycolannino
9-
editor: ''
10-
11-
ms.assetid: ffce7eb1-99da-4ea7-9c4d-2322b755c8ce
128
ms.service: active-directory
139
ms.topic: troubleshooting
14-
ms.tgt_pltfrm: na
1510
ms.workload: identity
1611
ms.subservice: report-monitor
17-
ms.date: 08/26/2022
18-
ms.author: markvi
12+
ms.date: 11/01/2022
13+
ms.author: sarahlipsey
1914
ms.reviewer: dhanyahk
2015

2116
ms.collection: M365-identity-device-management
@@ -35,7 +30,7 @@ When you download activity logs in the Azure portal, we limit the scale to 250,0
3530

3631
## Resolution
3732

38-
You can leverage [Azure AD Reporting APIs](concept-reporting-api.md) to fetch up to a million records at any given point.
33+
You can use [Azure AD Reporting APIs](concept-reporting-api.md) to fetch up to a million records at any given point.
3934

4035
## Next steps
4136

articles/active-directory/reports-monitoring/workbook-authentication-prompts-analysis.md

Lines changed: 8 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -3,17 +3,14 @@
33
title: Authentication prompts analysis workbook in Azure AD | Microsoft Docs
44
description: Learn how to use the authentication prompts analysis workbook.
55
services: active-directory
6-
documentationcenter: ''
7-
author: MarkusVi
6+
author: shlipsey3
87
manager: amycolannino
9-
editor: ''
10-
118
ms.service: active-directory
129
ms.topic: reference
1310
ms.workload: identity
1411
ms.subservice: report-monitor
15-
ms.date: 08/26/2022
16-
ms.author: markvi
12+
ms.date: 11/01/2022
13+
ms.author: sarahlipsey
1714
ms.reviewer: sarbar
1815

1916
ms.collection: M365-identity-device-management
@@ -33,7 +30,7 @@ This article provides you with an overview of this workbook.
3330

3431
Have you recently heard of complaints from your users about getting too many authentication prompts?
3532

36-
Over prompting users impacts your user's productivity and often leads users getting phished for MFA. To be clear, MFA is essential! We are not talking about if you should require MFA but how frequently you should prompt your users.
33+
Overprompting users can affect your user's productivity and often leads users getting phished for MFA. To be clear, MFA is essential! We are not talking about if you should require MFA but how frequently you should prompt your users.
3734

3835
Typically, this scenario is caused by:
3936

@@ -77,7 +74,7 @@ In many environments, the most used apps are business productivity apps. Anythin
7774

7875
![Authentication prompts by application](./media/workbook-authentication-prompts-analysis/authentication-prompts-by-application.png)
7976

80-
The prompts by application list-view shows additional information such as timestamps, and request IDs that help with investigations.
77+
The prompts by application list view shows additional information such as timestamps, and request IDs that help with investigations.
8178

8279
Additionally, you get a summary of the average and median prompts count for your tenant.
8380

@@ -106,7 +103,7 @@ Filtering for a specific user that has many authentication requests or only show
106103
## Best practices
107104

108105

109-
If data isn't showing up or seems to be showing up incorrectly, please confirm that you have set the **Log Analytics Workspace** and **Subscriptions** on the proper resources.
106+
If data isn't showing up or seems to be showing up incorrectly, confirm that you have set the **Log Analytics Workspace** and **Subscriptions** on the proper resources.
110107

111108

112109
![Set workspace and subscriptions](./media/workbook-authentication-prompts-analysis/workspace-and-subscriptions.png)
@@ -120,9 +117,9 @@ If the visuals are taking too much time to load, try reducing the Time filter to
120117

121118
## Next steps
122119

123-
- To understand more about the different policies that impact MFA prompts, see [Optimize reauthentication prompts and understand session lifetime for Azure AD Multi-Factor Authentication](../authentication/concepts-azure-multi-factor-authentication-prompts-session-lifetime.md).
120+
- To understand more about the different policies that affect MFA prompts, see [Optimize reauthentication prompts and understand session lifetime for Azure AD Multi-Factor Authentication](../authentication/concepts-azure-multi-factor-authentication-prompts-session-lifetime.md).
124121

125-
- To learn more about the different vulnerabilities of different MFA methods, see [All your creds are belong to us!](https://aka.ms/allyourcreds).
122+
- To learn more about the different vulnerabilities of different MFA methods, see [All your creds belong to us!](https://aka.ms/allyourcreds).
126123

127124
- To learn how to move users from telecom-based methods to the Authenticator app, see [How to run a registration campaign to set up Microsoft Authenticator - Microsoft Authenticator app](../authentication/how-to-mfa-registration-campaign.md).
128125

articles/active-directory/reports-monitoring/workbook-conditional-access-gap-analyzer.md

Lines changed: 5 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -3,17 +3,14 @@
33
title: Conditional access gap analyzer workbook in Azure AD | Microsoft Docs
44
description: Learn how to use the conditional access gap analyzer workbook.
55
services: active-directory
6-
documentationcenter: ''
7-
author: MarkusVi
6+
author: shlipsey3
87
manager: amycolannino
9-
editor: ''
10-
118
ms.service: active-directory
129
ms.topic: reference
1310
ms.workload: identity
1411
ms.subservice: report-monitor
15-
ms.date: 08/26/2022
16-
ms.author: markvi
12+
ms.date: 11/01/2022
13+
ms.author: sarahlipsey
1714
ms.reviewer: sarbar
1815

1916
ms.collection: M365-identity-device-management
@@ -49,11 +46,11 @@ The workbook has four sections:
4946

5047
- Users signing in using legacy authentication
5148

52-
- Number of sign-ins by applications that are not impacted by conditional access policies
49+
- Number of sign-ins by applications that aren't impacted by conditional access policies
5350

5451
- High risk sign-in events bypassing conditional access policies
5552

56-
- Number of sign-ins by location that were not affected by conditional access policies
53+
- Number of sign-ins by location that weren't affected by conditional access policies
5754

5855

5956
![Conditional access coverage by location](./media/workbook-conditional-access-gap-analyzer/conditianal-access-by-location.png)

articles/active-directory/reports-monitoring/workbook-cross-tenant-access-activity.md

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,17 +3,14 @@
33
title: Cross-tenant access activity workbook in Azure AD | Microsoft Docs
44
description: Learn how to use the cross-tenant access activity workbook.
55
services: active-directory
6-
documentationcenter: ''
7-
author: msmimart
6+
author: shlipsey3
87
manager: amycolannino
9-
editor: ''
10-
118
ms.service: active-directory
129
ms.topic: reference
1310
ms.workload: identity
1411
ms.subservice: report-monitor
15-
ms.date: 08/26/2022
16-
ms.author: mimart
12+
ms.date: 11/01/2022
13+
ms.author: sarahlipsey
1714

1815
ms.collection: M365-identity-device-management
1916
---

0 commit comments

Comments
 (0)