Skip to content

Commit c705132

Browse files
authored
Merge pull request #179701 from MarkusVi/fsi03
fsi03
2 parents 6caf3d0 + 655291a commit c705132

File tree

1 file changed

+24
-7
lines changed

1 file changed

+24
-7
lines changed

articles/active-directory/reports-monitoring/overview-flagged-sign-ins.md

Lines changed: 24 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,20 @@
22

33
title: What are flagged sign-ins in Azure Active Directory?
44
description: Provides a general overview of flagged sign-ins in Azure Active Directory.
5+
services: active-directory
6+
documentationcenter: ''
57
author: MarkusVi
68
manager: karenhoran
9+
editor: ''
10+
711
ms.assetid: e2b3d8ce-708a-46e4-b474-123792f35526
812
ms.service: active-directory
13+
ms.devlang: na
914
ms.topic: overview
15+
ms.tgt_pltfrm: na
1016
ms.workload: identity
1117
ms.subservice: report-monitor
12-
ms.date: 10/27/2021
18+
ms.date: 11/12/2021
1319
ms.author: markvi
1420
ms.reviewer: tspring
1521

@@ -24,6 +30,8 @@ As an IT admin, when a user failed to sign-in, you want to resolve the issue as
2430
This article gives you an overview of a feature that significantly improves the time it takes to resolve user sign-in problems by making the related problems easy to find.
2531

2632

33+
34+
2735
## What it is
2836

2937
Azure AD sign-in events are critical to understanding what went right or wrong with user sign-ins and the authentication configuration in a tenant. However, Azure AD processes over 8 billion authentications a day, which can result in so many sign-in events that admins may find it difficult to find the ones which matter. In other words, the sheer number of sign-in events can make the signal of users who need assistance get lost in the volume of a large number of events.
@@ -35,7 +43,9 @@ Flagged sign-ins gives the user the ability to enable flagging when an error is
3543
In summary, you can use flagged sign-ins to:
3644

3745
- **Empower** users to indicate the sign-in errors they need their tenant admins help on.
46+
3847
- **Simplify** the process of locating the sign-in errors a user needs to be resolved.
48+
3949
- **Enable** help desk personal find the problems users want help with proactively- without the end user having to do anything other than flag the event.
4050

4151
## How it works
@@ -66,20 +76,27 @@ After enabling flagging, the same browser application and client must be used or
6676

6777
### Admin or Developer: Find flagged events using MS Graph
6878

69-
You can find flagged sign-ins with a filtered query using the sign-ins reporting API. A sample query is:
70-
71-
`https://graph.microsoft.com/beta/auditlogs/signins?&$filter=(flaggedForReview eq true)`
79+
You can find flagged sign-ins with a filtered query using the sign-ins reporting API.
80+
81+
Show all Flagged Sign-ins:
82+
`https://graph.microsoft.com/beta/auditLogs/signIns?&$filter=flaggedforReview eq true`
7283

73-
For more information on using the sign-ins Graph API, see [signIn resource type](/graph/api/resources/signin?view=graph-rest-1.0&preserve-view=true).
84+
Flagged Sign-ins query for specific user by UPN (e.g.: [email protected]):
85+
`https://graph.microsoft.com/beta/auditLogs/signIns?&$filter=flaggedforReview eq true and userPrincipalname eq '[email protected]'`
86+
87+
Flagged Sign-ins query for specific user and date greater than:
88+
`https://graph.microsoft.com/beta/auditLogs/signIns?&$filter=flaggedforReview eq true and createdDateTime ge 2021-10-01 and userPrincipalname eq '[email protected]'`
89+
90+
For more information on using the sign-ins Graph API, see [signIn resource type](https://docs.microsoft.com/graph/api/resources/signin?view=graph-rest-1.0&preserve-view=true).
7491

7592

7693

7794

78-
## Who can create it?
95+
## Who can create flagged sign-ins?
7996

8097
Any user signing into Azure AD via web page can use flag sign-ins for review. Member and guest users alike can flag sign-in errors for review.
8198

82-
## Who can review it?
99+
## Who can review flagged sign-ins?
83100

84101
Reviewing flagged sign-in events requires permissions to read the Sign-in Report events in the Azure AD portal. For more information, see [who can access it?](concept-sign-ins.md#who-can-access-it)
85102

0 commit comments

Comments
 (0)