Skip to content

Commit f0338b1

Browse files
committed
added info about events for NPS and AD FS
1 parent 8aea69a commit f0338b1

File tree

1 file changed

+15
-2
lines changed

1 file changed

+15
-2
lines changed

articles/active-directory/authentication/howto-mfa-reporting.md

Lines changed: 15 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 06/20/2022
9+
ms.date: 10/04/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -143,10 +143,23 @@ The following additional information and reports are available for MFA events, i
143143
| Report | Location | Description |
144144
|:--- |:--- |:--- |
145145
| Blocked User History | Azure AD > Security > MFA > Block/unblock users | Shows the history of requests to block or unblock users. |
146-
| Usage for on-premises components | Azure AD > Security > MFA > Activity Report | Provides information on overall usage for MFA Server through the NPS extension, ADFS, and MFA Server. |
146+
| Usage for on-premises components | Azure AD > Security > MFA > Activity Report | Provides information on overall usage for MFA Server through the NPS extension, AD FS, and MFA Server. |
147147
| Bypassed User History | Azure AD > Security > MFA > One-time bypass | Provides a history of MFA Server requests to bypass MFA for a user. |
148148
| Server status | Azure AD > Security > MFA > Server status | Displays the status of MFA Servers associated with your account. |
149149

150+
Cloud MFA sign-in events from an on-premises AD FS adapter or NPS extension won't have all fields in the sign-in logs populated due to limited data returned by the on-premises component. You can identify these events by the resourceID _adfs_ or _radius_ in the event properties. They include:
151+
- resultSignature
152+
- appID
153+
- deviceDetail
154+
- conditionalAccessStatus
155+
- authenticationContext
156+
- isInteractive
157+
- tokenIssuerName
158+
- riskDetail, riskLevelAggregated,riskLevelDuringSignIn, riskState,riskEventTypes, riskEventTypes_v2
159+
- authenticationProtocol
160+
- incomingTokenType
161+
162+
Organizations that run the latest version of NPS extension or use Azure AD Connect Health will have location IP address in events.
150163

151164
## Next steps
152165

0 commit comments

Comments
 (0)