Skip to content

Commit d559a1e

Browse files
author
Jill Grant
authored
Merge pull request #251387 from Justinha/steps=auth-5
revised portal steps
2 parents 7a8b13c + e16f0e3 commit d559a1e

File tree

4 files changed

+47
-50
lines changed

4 files changed

+47
-50
lines changed

articles/active-directory/authentication/howto-mfa-reporting-datacollection.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -6,12 +6,12 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 01/07/2021
9+
ms.date: 09/13/2021
1010

1111
ms.author: justinha
1212
author: justinha
1313
manager: amycolannino
14-
ms.reviewer: michmcla
14+
ms.reviewer: jpettere
1515

1616
ms.collection: M365-identity-device-management
1717
---
@@ -149,39 +149,39 @@ From the command line of the MFA Server, run the following command changing the
149149

150150
## Gather data from NPS Extension
151151

152-
Use the [Microsoft Privacy Portal](https://portal.azure.com/#blade/Microsoft_Azure_Policy/UserPrivacyMenuBlade/Overview) to make a request for Export.
152+
Use the Microsoft Privacy portal to make a request for Export.
153153

154154
- MFA information is included in the export, which may take hours or days to complete.
155155
- Occurrences of the username in the AzureMfa/AuthN/AuthNOptCh, AzureMfa/AuthZ/AuthZAdminCh, and AzureMfa/AuthZ/AuthZOptCh event logs are considered operational and duplicative to the information provided in the export.
156156

157157
## Delete data from NPS Extension
158158

159-
Use the [Microsoft Privacy Portal](https://portal.azure.com/#blade/Microsoft_Azure_Policy/UserPrivacyMenuBlade/Overview) to make a request for Account Close to delete all MFA cloud service information collected for this user.
159+
Use the Microsoft Privacy portal to make a request for Account Close to delete all MFA cloud service information collected for this user.
160160

161161
- It may take up to 30 days for data to be fully removed.
162162

163163
## Gather data from Windows Server 2016 Azure AD MFA AD FS Adapter
164164

165-
Use the [Microsoft Privacy Portal](https://portal.azure.com/#blade/Microsoft_Azure_Policy/UserPrivacyMenuBlade/Overview) to make a request for Export.
165+
Use the Microsoft Privacy portal to make a request for Export.
166166

167167
- MFA information is included in the export, which may take hours or days to complete.
168168
- Occurrences of the username in the AD FS Tracing/Debug event logs (if enabled) are considered operational and duplicative to the information provided in the export.
169169

170170
## Delete data from Windows Server 2016 Azure AD MFA AD FS Adapter
171171

172-
Use the [Microsoft Privacy Portal](https://portal.azure.com/#blade/Microsoft_Azure_Policy/UserPrivacyMenuBlade/Overview) to make a request for Account Close to delete all MFA cloud service information collected for this user.
172+
Use the Microsoft Privacy portal to make a request for Account Close to delete all MFA cloud service information collected for this user.
173173

174174
- It may take up to 30 days for data to be fully removed.
175175

176176
## Gather data for Azure AD MFA
177177

178-
Use the [Microsoft Privacy Portal](https://portal.azure.com/#blade/Microsoft_Azure_Policy/UserPrivacyMenuBlade/Overview) to make a request for Export.
178+
Use the Microsoft Privacy portal to make a request for Export.
179179

180180
- MFA information is included in the export, which may take hours or days to complete.
181181

182182
## Delete data for Azure AD MFA
183183

184-
Use the [Microsoft Privacy Portal](https://portal.azure.com/#blade/Microsoft_Azure_Policy/UserPrivacyMenuBlade/Overview) to make a request for Account Close to delete all MFA cloud service information collected for this user.
184+
Use the Microsoft Privacy portal to make a request for Account Close to delete all MFA cloud service information collected for this user.
185185

186186
- It may take up to 30 days for data to be fully removed.
187187

articles/active-directory/authentication/howto-mfa-reporting.md

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 06/01/2023
9+
ms.date: 09/13/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -20,8 +20,6 @@ ms.custom: has-azure-ad-ps-ref
2020

2121
To review and understand Azure AD Multi-Factor Authentication events, you can use the Azure Active Directory (Azure AD) sign-ins report. This report shows authentication details for events when a user is prompted for multi-factor authentication, and if any Conditional Access policies were in use. For detailed information on the sign-ins report, see the [overview of sign-in activity reports in Azure AD](../reports-monitoring/concept-sign-ins.md).
2222

23-
This article shows you how to view the Azure AD sign-ins report in the Azure portal, and then the MSOnline V1 PowerShell module.
24-
2523
## View the Azure AD sign-ins report
2624

2725
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
@@ -36,16 +34,16 @@ The sign-ins report provides you with information about the usage of managed app
3634
- How many users are unable to complete the MFA challenge?
3735
- What are the common MFA issues end users are running into?
3836

39-
To view the sign-in activity report in the [Azure portal](https://portal.azure.com), complete the following steps. You can also query data using the [reporting API](../reports-monitoring/howto-configure-prerequisites-for-reporting-api.md).
37+
To view the sign-in activity report in the [Microsoft Entra admin center](https://entra.microsoft.com), complete the following steps. You can also query data using the [reporting API](../reports-monitoring/howto-configure-prerequisites-for-reporting-api.md).
4038

41-
1. Sign in to the [Azure portal](https://portal.azure.com) using an account with *global administrator* permissions.
42-
1. Search for and select **Azure Active Directory**, then choose **Users** from the menu on the left-hand side.
39+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
40+
1. Browse to **Identity** > then choose **Users** from the menu on the left-hand side.
4341
1. Under *Activity* from the menu on the left-hand side, select **Sign-ins**.
4442
1. A list of sign-in events is shown, including the status. You can select an event to view more details.
4543

4644
The **Conditional Access** tab of the event details shows you which policy triggered the MFA prompt.
4745

48-
[![Screenshot of example Azure Active Directory sign-ins report in the Azure portal](media/howto-mfa-reporting/sign-in-report-cropped.png)](media/howto-mfa-reporting/sign-in-report.png#lightbox)
46+
[![Screenshot of example Azure Active Directory sign-ins report](media/howto-mfa-reporting/sign-in-report-cropped.png)](media/howto-mfa-reporting/sign-in-report.png#lightbox)
4947

5048
If available, the authentication is shown, such as text message, Microsoft Authenticator app notification, or phone call.
5149

articles/active-directory/authentication/howto-mfaserver-adfs-2.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,17 @@
11
---
2-
title: Use Azure MFA Server with AD FS 2.0
3-
description: Describes how to get started with Azure MFA and AD FS 2.0.
2+
title: Use Azure Active Directory Multi-Factor Authentication Server with AD FS 2.0
3+
description: Describes how to get started with Azure Active Directory Multi-Factor Authentication and AD FS 2.0.
44

55
services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 10/29/2022
9+
ms.date: 09/13/2023
1010

1111
ms.author: justinha
1212
author: justinha
1313
manager: amycolannino
14-
ms.reviewer: michmcla
14+
ms.reviewer: jpettere
1515

1616
ms.collection: M365-identity-device-management
1717
---
@@ -22,7 +22,7 @@ This article is for organizations that are federated with Azure Active Directory
2222
This documentation covers using the Azure Multi-Factor Authentication Server with AD FS 2.0. For information about AD FS, see [Securing cloud and on-premises resources using Azure Multi-Factor Authentication Server with Windows Server](howto-mfaserver-adfs-windows-server.md).
2323

2424
> [!IMPORTANT]
25-
> In September 2022, Microsoft announced deprecation of Azure Multi-Factor Authentication Server. Beginning September 30, 2024, Azure Multi-Factor Authentication Server deployments will no longer service multifactor authentication (MFA) requests, which could cause authentications to fail for your organization. To ensure uninterrupted authentication services and to remain in a supported state, organizations should [migrate their users’ authentication data](how-to-migrate-mfa-server-to-mfa-user-authentication.md) to the cloud-based Azure MFA service by using the latest Migration Utility included in the most recent [Azure MFA Server update](https://www.microsoft.com/download/details.aspx?id=55849). For more information, see [Azure MFA Server Migration](how-to-migrate-mfa-server-to-azure-mfa.md).
25+
> In September 2022, Microsoft announced deprecation of Azure Multi-Factor Authentication Server. Beginning September 30, 2024, Azure Multi-Factor Authentication Server deployments will no longer service multifactor authentication (MFA) requests, which could cause authentications to fail for your organization. To ensure uninterrupted authentication services and to remain in a supported state, organizations should [migrate their users’ authentication data](how-to-migrate-mfa-server-to-mfa-user-authentication.md) to the cloud-based Azure Active Directory Multi-Factor Authentication service by using the latest Migration Utility included in the most recent [Azure Active Directory Multi-Factor Authentication Server update](https://www.microsoft.com/download/details.aspx?id=55849). For more information, see [Azure Active Directory Multi-Factor Authentication Server Migration](how-to-migrate-mfa-server-to-azure-mfa.md).
2626
>
2727
> To get started with cloud-based MFA, see [Tutorial: Secure user sign-in events with Azure Multi-Factor Authentication](tutorial-enable-azure-mfa.md).
2828
>
@@ -77,7 +77,7 @@ You enabled IIS authentication, but to perform the pre-authentication to your Ac
7777
![Configure LDAP settings for specific LDAP settings](./media/howto-mfaserver-adfs-2/ldap1.png)
7878

7979
3. Click **Edit**.
80-
4. In the Edit LDAP Configuration dialog box, populate the fields with the information required to connect to the AD domain controller. Descriptions of the fields are included in the Azure Multi-Factor Authentication Server help file.
80+
4. In the Edit LDAP Configuration dialog box, populate the fields with the information required to connect to the AD domain controller.
8181
5. Test the LDAP connection by clicking the **Test** button.
8282

8383
![Test LDAP Configuration in MFA Server](./media/howto-mfaserver-adfs-2/ldap2.png)
@@ -89,7 +89,7 @@ You enabled IIS authentication, but to perform the pre-authentication to your Ac
8989
1. Next, click the **Company Settings** icon and select the **Username Resolution** tab.
9090
2. Select the **Use LDAP unique identifier attribute for matching usernames** radio button.
9191
3. If users enter their username in "domain\username" format, the Server needs to be able to strip the domain off the username when it creates the LDAP query, which can be done through a registry setting.
92-
4. Open the registry editor and go to HKEY_LOCAL_MACHINE/SOFTWARE/Wow6432Node/Positive Networks/PhoneFactor on a 64-bit server. If on a 32-bit server, take the "Wow6432Node" out of the path. Create a DWORD registry key called "UsernameCxz_stripPrefixDomain" and set the value to 1. Azure Multi-Factor Authentication is now securing the AD FS proxy.
92+
4. Open the registry editor and go to HKEY_LOCAL_MACHINE/SOFTWARE/Wow6432Node/Positive Networks/PhoneFactor on a 64-bit server. If you use a 32-bit server, remove **/Wow6432Node** from the path. Create a DWORD registry key called "UsernameCxz_stripPrefixDomain" and set the value to 1. Azure Multi-Factor Authentication is now securing the AD FS proxy.
9393

9494
Make sure users are imported from Active Directory into the Server. To allow users to skip two-step verification from internal IP addresses, see the [Trusted IPs](#trusted-ips).
9595

@@ -115,7 +115,7 @@ You can secure AD FS when the AD FS proxy isn't used. Install the Azure Multi-Fa
115115

116116
Azure Multi-Factor Authentication is now securing AD FS.
117117

118-
Ensure that users have been imported from Active Directory into the Server. See the Trusted IPs section if you would like to allow internal IP addresses so that two-step verification isn't required when signing in to the website from those locations.
118+
Ensure that users have been imported from Active Directory into the Server. See the next section if you would like to allow internal IP addresses so that two-step verification isn't required when signing in to the website from those locations.
119119

120120
## Trusted IPs
121121

0 commit comments

Comments
 (0)