Skip to content

Commit ce06297

Browse files
author
Markus Vilcinskas
committed
recover05
1 parent 3c041f0 commit ce06297

File tree

2 files changed

+147
-1
lines changed

2 files changed

+147
-1
lines changed

articles/active-directory/reports-monitoring/overview-recommendations.md

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -154,12 +154,21 @@ To manage your Azure AD recommendations:
154154

155155

156156

157-
158157
### Update the status of a resource
159158

160159
To update the status of a resource, you have to right click a resource to bring up the edit menu.
161160

162161

162+
## What you should know
163+
164+
- The Azure AD recommendations feature supports all editions of Azure AD. In other words, there is no specific subscription or license required to use this feature.
165+
166+
- On the recommendations page, you might not see all supported recommendations. This is because Azure AD only displays the recommendations that apply to your tenant.
167+
168+
169+
- Some recommendations have a list of impacted resources associated. This list of resources gives you more context on how the recommendation applies to you and/or which resources you need to address.
170+
171+
163172

164173
## Next steps
165174

Lines changed: 137 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,137 @@
1+
---
2+
title: Basic info in the Azure AD sign-in logs | Microsoft Docs
3+
description: Learn what the basic info in the sign-in logs is about.
4+
services: active-directory
5+
documentationcenter: ''
6+
author: MarkusVi
7+
manager: karenhoran
8+
editor: ''
9+
10+
ms.assetid: 9b88958d-94a2-4f4b-a18c-616f0617a24e
11+
ms.service: active-directory
12+
ms.topic: reference
13+
ms.tgt_pltfrm: na
14+
ms.workload: identity
15+
ms.subservice: report-monitor
16+
ms.date: 12/17/2021
17+
ms.author: markvi
18+
ms.reviewer: besiler
19+
20+
ms.collection: M365-identity-device-management
21+
---
22+
23+
# Basic info in the Azure AD sign-in logs
24+
25+
Azure AD logs all sign-ins into an Azure tenant for compliance. As an IT administrator, you need to know what the values in the sign-in logs mean, so that you can interpret the log values correctly.
26+
27+
This article explains the values on the Basic info tab of the sign-ins log.
28+
29+
## Unique identifiers
30+
31+
In Azure AD, a resource access has three relevant components:
32+
33+
- **Who** – The identity (User) doing the sign-in.
34+
- **How** – The client (Application) used for the access.
35+
- **What** – The target (Resource) accessed by the identity.
36+
37+
38+
Each component has an associated unique identifier (ID). Below is an example of user using the Windows Azure classic deployment model to access the Azure portal.
39+
40+
![Open audit logs](./media/reference-basic-info-sign-in-logs/sign-in-details-basic-info.png)
41+
42+
### Tenant identifiers
43+
44+
The sign-in log tracks two tenant identifiers:
45+
46+
- **Home tenant** – The tenant that owns the user identity.
47+
- **Resource tenant** – The tenant that owns the (target) resource.
48+
49+
These identifiers are relevant in cross-tenant scenarios. For example, to find out how users outside your tenant are accessing your resources, select all entries where the home tenant doesn’t match the resource tenant.
50+
51+
### Request ID
52+
53+
The request ID is an identifier that corresponds to an issued token. If you are looking for sign-ins with a specific token, you need to extract the request ID from the token, first.
54+
55+
56+
### Correlation ID
57+
58+
The correlation ID groups sign-ins from the same sign-in session. The identifier was implemented for convenience. Its accuracy is not guaranteed because the value is based on parameters passed by a client.
59+
60+
61+
## Sign-in identifier
62+
63+
The sign-in identifier is a string the user provides to Azure AD to identify itself when attempting to sign-in. It's usually a UPN, but can be another identifier such as a phone number.
64+
65+
66+
## Authentication requirement
67+
68+
This attribute shows the highest level of authentication needed through all the sign-in steps for the sign-in to succeed. In the Graph API, supports `$filter` (`eq` and `startsWith` operators only).
69+
70+
## Sign-in event types
71+
72+
Indicates the category of the sign in the event represents. For user sign-ins, the category can be `interactiveUser` or `nonInteractiveUser` and corresponds to the value for the **isInteractive** property on the sign-in resource. For managed identity sign-ins, the category is `managedIdentity`. For service principal sign-ins, the category is **servicePrincipal**. The Azure portal doesn't show this value, but the sign-in event is placed in the tab that matches its sign-in event type. Possible values are:
73+
74+
- `interactiveUser`
75+
- `nonInteractiveUser`
76+
- `servicePrincipal`
77+
- `managedIdentity`
78+
- `unknownFutureValue`
79+
80+
The Microsoft Graph API, supports: `$filter` (`eq` operator only)
81+
82+
## User type
83+
84+
The type of a user. Examples include `member`, `guest`, or `external`.
85+
86+
87+
## Cross-tenant access type
88+
89+
This attribute describes the type of cross-tenant access used by the actor to access the resource. Possible values are:
90+
91+
- `none`
92+
- `b2bCollaboration`
93+
- `b2bDirectConnect`
94+
- `microsoftSupport`
95+
- `serviceProvider`
96+
- `unknownFutureValue`
97+
98+
If the sign-in did not the pass the boundaries of a tenant, the value is `none`.
99+
100+
## Conditional access evaluation
101+
102+
This value shows whether continuous access evaluation (CAE) was applied to the sign-in event. There are multiple sign-in requests for each authentication. Some are shown on the interactive tab, while others are shown on the non-interactive tab. CAE is only displayed as true for one of the requests, and it can be on the interactive tab or non-interactive tab. For more information, see [Monitor and troubleshoot sign-ins with continuous access evaluation in Azure AD](../conditional-access/howto-continuous-access-evaluation-troubleshoot.md).
103+
104+
105+
106+
107+
108+
109+
110+
111+
112+
113+
114+
115+
116+
117+
118+
119+
120+
121+
122+
123+
124+
125+
126+
127+
128+
129+
130+
131+
132+
133+
134+
## Next steps
135+
136+
* [Sign-in logs in Azure Active Directory](concept-sign-ins.md)
137+
* [What is the sign-in diagnostic in Azure AD?](overview-sign-in-diagnostics.md)

0 commit comments

Comments
 (0)