Skip to content

Commit e7d84c2

Browse files
Merge pull request #232381 from shlipsey3/PM-updates-032823
PM-updates-032823
2 parents c7dd857 + 61c65ba commit e7d84c2

File tree

2 files changed

+8
-3
lines changed

2 files changed

+8
-3
lines changed

articles/active-directory/reports-monitoring/concept-all-sign-ins.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.topic: conceptual
99
ms.workload: identity
1010
ms.subservice: report-monitor
11-
ms.date: 03/24/2023
11+
ms.date: 03/28/2023
1212
ms.author: sarahlipsey
1313
ms.reviewer: besiler
1414
ms.collection: M365-identity-device-management
@@ -142,7 +142,8 @@ Sign-ins are aggregated in the non-interactive users when the following data mat
142142
- Status
143143
- Resource ID
144144

145-
The IP address of non-interactive sign-ins doesn't match the actual source IP of where the refresh token request is coming from. Instead, it shows the original IP used for the original token issuance.
145+
> [!NOTE]
146+
> The IP address of non-interactive sign-ins performed by [confidential clients](../develop/msal-client-applications.md) doesn't match the actual source IP of where the refresh token request is coming from. Instead, it shows the original IP used for the original token issuance.
146147
147148
### Service principal sign-ins
148149

articles/active-directory/reports-monitoring/reports-faq.yml

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ metadata:
99
ms.workload: identity
1010
ms.topic: faq
1111
ms.subservice: report-monitor
12-
ms.date: 02/22/2023
12+
ms.date: 03/28/2023
1313
ms.author: sarahlipsey
1414
ms.reviewer: besiler
1515
ms.collection: M365-identity-device-management
@@ -40,6 +40,10 @@ sections:
4040
I currently use the https://graph.windows.net/<tenant-name>/reports/ endpoint APIs to pull Azure AD security reports (specific types of detections, such as leaked credentials or sign-ins from anonymous IP addresses) into our reporting systems programmatically. What should I switch to?
4141
answer: |
4242
You can use the [Identity Protection risk detections API](../identity-protection/howto-identity-protection-graph-api.md) to access security detections through Microsoft Graph. This new format gives greater flexibility in how you can query data. The format includes advanced filtering and field selection and standardizes risk detections into one type for easier integration into SIEMs and other data collection tools. Because the data is in a different format, you can't substitute a new query for your old queries. However, [the new API uses Microsoft Graph](/graph/api/resources/identityprotection-root), which is the Microsoft standard for such APIs as Microsoft 365 or Azure AD. So the work required can either extend your current Microsoft Graph investments or help you begin your transition to this new standard platform.
43+
- question: |
44+
I used the signInActivity resource to look up a user's last sign-in time, but it hasn't updated after a few hours. When will it be updated with the latest sign in time?
45+
answer: |
46+
The signInActivity resource is used to find inactive [users who haven't signed in for some time](howto-manage-inactive-user-accounts.md). It does not update in near real time; you should expect up to 24 hours before the property is updated for a given user. If you need to find the user's last sign-in activity more quickly than that, you can use the Azure AD sign-ins blade to see near real time sign-in activity for all your users.
4347
4448
- name: Activity logs
4549
questions:

0 commit comments

Comments
 (0)