Skip to content

Commit fb18f76

Browse files
authored
Merge pull request #105612 from MarkusVi/dhanyah32
dhanyah32
2 parents 80d480c + da0ce6c commit fb18f76

File tree

7 files changed

+72
-42
lines changed

7 files changed

+72
-42
lines changed

articles/active-directory/reports-monitoring/concept-sign-ins.md

Lines changed: 72 additions & 42 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.topic: conceptual
1414
ms.tgt_pltfrm: na
1515
ms.workload: identity
1616
ms.subservice: report-monitor
17-
ms.date: 12/09/2019
17+
ms.date: 02/26/2020
1818
ms.author: markvi
1919
ms.reviewer: dhanyahk
2020

@@ -98,60 +98,90 @@ Select an item in the list view to get more detailed information.
9898

9999
## Filter sign-in activities
100100

101-
First, narrowing down the reported data to a level that works for you. Second, filter sign-ins data using date field as default filter. Azure AD provides you with a broad range of additional filters you can set.
101+
First, narrowing down the reported data to a level that works for you. Second, filter sign-ins data using date field as default filter. Azure AD provides you with a broad range of additional filters you can set:
102102

103103
![Sign-in activity](./media/concept-sign-ins/04.png "Sign-in activity")
104104

105-
The **User** filter enables you to specify the name or the user principal name (UPN) of the user you care about.
105+
**Request ID** - The ID of the request you care about.
106106

107-
The **Application** filter enables you to specify the name of the application you care about.
107+
**User** - The name or the user principal name (UPN) of the user you care about.
108108

109-
The **Sign-in status** filter enables you to select:
109+
**Application** - The name of the target application.
110+
111+
**Status** - The sign-in status you care about:
110112

111-
- All
112113
- Success
114+
113115
- Failure
114116

115-
The **Conditional Access** filter enables you to select the CA policy status for the sign-in:
117+
- Interrupted
118+
119+
120+
**IP address** - The IP address of the device used to connect to your tenant.
121+
122+
The **Location** - The location the connection was initiated from:
123+
124+
- City
125+
126+
- State / Province
127+
128+
- Country/Region
129+
130+
131+
**Resource** - The name of the service used for the sign-in.
132+
133+
134+
**Resource ID** - The ID of the service used for the sign-in.
135+
136+
137+
**Client app** - The type of the client app used to connect to your tenant:
138+
139+
![Client app filter](./media/concept-sign-ins/client-app-filter.png)
140+
141+
142+
|Name|Modern authentication|Description|
143+
|---|:-:|---|
144+
|Authenticated SMTP| |Used by POP and IMAP client's to send email messages.|
145+
|Autodiscover| |Used by Outlook and EAS clients to find and connect to mailboxes in Exchange Online.|
146+
|Exchange ActiveSync| |This filter shows all sign-in attempts where the EAS protocol has been attempted.|
147+
|Browser|![Check](./media/concept-sign-ins/check.png)|Shows all sign-in attempts from users using web browsers|
148+
|Exchange ActiveSync| | Shows all sign-in attempts from users with client apps using Exchange ActiceSync to connect to Exchange Online|
149+
|Exchange Online PowerShell| |Used to connect to Exchange Online with remote PowerShell. If you block basic authentication for Exchange Online PowerShell, you need to use the Exchange Online PowerShell module to connect. For instructions, see [Connect to Exchange Online PowerShell using multi-factor authentication](https://docs.microsoft.com/powershell/exchange/exchange-online/connect-to-exchange-online-powershell/mfa-connect-to-exchange-online-powershell).|
150+
|Exchange Web Services| |A programming interface that's used by Outlook, Outlook for Mac, and third-party apps.|
151+
|IMAP4| |A legacy mail client using IMAP to retrieve email.|
152+
|MAPI over HTTP| |Used by Outlook 2010 and later.|
153+
|Mobile apps and desktop clients|![Check](./media/concept-sign-ins/check.png)|Shows all sign-in attempts from users using mobile apps and desktop clients.|
154+
|Offline Address Book| |A copy of address list collections that are downloaded and used by Outlook.|
155+
|Outlook Anywhere (RPC over HTTP)| |Used by Outlook 2016 and earlier.|
156+
|Outlook Service| |Used by the Mail and Calendar app for Windows 10.|
157+
|POP3| |A legacy mail client using POP3 to retrieve email.|
158+
|Reporting Web Services| |Used to retrieve report data in Exchange Online.|
159+
|Other clients| |Shows all sign-in attempts from users where the client app is not included or unknown.|
160+
161+
162+
163+
**Operating system** - The operating system running on the device used sign-on to your tenant.
164+
165+
166+
**Device browser** - If the connection was initiated from a browser, this field enables you to filter by browser name.
167+
168+
169+
**Correlation ID** - The correlation ID of the activity.
170+
171+
172+
**Conditional access** - The status of the applied conditional access rules
173+
174+
- Not applied
116175

117-
- All
118-
- Not Applied
119176
- Success
177+
120178
- Failure
121179

122-
The **Date** filter enables to you to define a timeframe for the returned data.
123-
Possible values are:
124-
125-
- One month
126-
- 7 days
127-
- 24 hours
128-
- Custom time interval
129-
130-
When you select a custom timeframe, you can configure a start time and an end time.
131-
132-
If you add additional fields to your sign-ins view, these fields are automatically added to the list of filters. For example, by adding **Client App** field to your list, you also get another filter option that enables you to set the following filters:
133-
![Sign-in activity](./media/concept-sign-ins/12.png "Sign-in activity")
134-
135-
- **Browser**
136-
This filter shows all events where sign-in attempts were attempted using browser flows.
137-
- **Exchange ActiveSync (supported)**
138-
This filter shows all sign-in attempts where the Exchange ActiveSync (EAS) protocol has been attempted from supported platforms like iOS, Android, and Windows Phone.
139-
- **Exchange ActiveSync (unsupported)**
140-
This filter shows all sign-in attempts where the EAS protocol has been attempted from unsupported platforms like, Linux distros.
141-
- **Mobile Apps and Desktop clients**
142-
The filter shows all sign-in attempts that were not using browser flows. For example, mobile apps from any platform using any protocol or from Desktop client apps like Office on Windows or MacOS.
143-
144-
- **Other clients**
145-
- **IMAP**
146-
A legacy mail client using IMAP to retrieve email.
147-
- **MAPI**
148-
Office 2013, where ADAL is enabled and it is using MAPI.
149-
- **Old Office clients**
150-
Office 2013 in its default configuration where ADAL is not enabled and it is using MAPI, or Office 2016 where ADAL has been disabled.
151-
- **POP**
152-
A legacy mail client using POP3 to retrieve email.
153-
- **SMTP**
154-
A legacy mail client using SMTP to send email.
180+
181+
182+
183+
184+
155185

156186
## Download sign-in activities
157187

-11.2 KB
Loading
-8.22 KB
Loading
412 Bytes
Loading
11.9 KB
Loading
Loading
-9.46 KB
Loading

0 commit comments

Comments
 (0)