Skip to content

Commit dac99d5

Browse files
Merge pull request #267264 from TimShererWithAquent/graphps74
Bulk update | 174285 MS Graph PowerShell cmdlet update Phase 3
2 parents 80c1810 + 9a428ed commit dac99d5

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/security/fundamentals/recover-from-identity-compromise.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: security
99
ms.topic: how-to
1010
ms.date: 01/15/2023
1111
ms.author: bagol
12-
12+
ms.custom: has-azure-ad-ps-ref, azure-ad-ref-level-one-done
1313
---
1414

1515
# Recovering from systemic identity compromise
@@ -197,7 +197,7 @@ For more information, see:
197197

198198
### Monitoring with Microsoft Entra ID
199199

200-
Microsoft Entra sign-in logs can show whether multi-factor authentication is being used correctly. Access sign-in logs directly from the Microsoft Entra area in the Azure portal, use the **Get-AzureADAuditSignInLogs** cmdlet, or view them in the **Logs** area of Microsoft Sentinel.
200+
Microsoft Entra sign-in logs can show whether multi-factor authentication is being used correctly. Access sign-in logs directly from the Microsoft Entra area in the Azure portal, use the [Get-MgBetaAuditLogSignIn](/powershell/module/microsoft.graph.beta.reports/get-mgbetaauditlogsignin) cmdlet, or view them in the **Logs** area of Microsoft Sentinel.
201201

202202
For example, search or filter the results for when the **MFA results** field has a value of **MFA requirement satisfied by claim in the token**. If your organization uses ADFS and the claims logged are not included in the ADFS configuration, these claims may indicate attacker activity.
203203

0 commit comments

Comments
 (0)