|
- Presenting the new Unfamiliar Sign-in Properties | Microsoft . . .
Hi everyone! I’m excited to share details about the new version of the Unfamiliar Sign-in Properties in Azure AD Identity Protection, which is available with Azure AD Premium P2 subscription This is an evolution of the Unfamiliar Locations detection that considers past sign-in history of users to detect anomalous activity
- Sign in to Azure DevOps | Microsoft Community Hub
Sign in to Azure DevOps The https: dev azure com URL redirects to the landing page for the Azure DevOps product I used to promote this as an URL to use to login to the product Since this year the page is missing the "Already have an account? Sing in to Azure DevOp s" link
- Combatting Risky Sign-ins in Azure Active Directory
Risky sign ins – sign in aggregate risk levels, sign in information (device, application, location, etc ), detection type Risk detections – risk detections over the last 90 days with detection type and other details These reports can be found by going to the Security tab in Azure Active Directory Figure 1 shows the Risky sign ins report
- Conditional Access: Can someone please explain sign-in . . .
Hi Guys I have a similar question I want that everytime i turn on the computer my office credentials, including browsers and onedrive, ask again for my password once for the duration of the session I am trying with Azure Portal Sign In Frequency and Persistent Browser Can someone help me archive it? I believe i'm close but when i use "every time" frequency onedrive goes nuts and tries to
- How to interpret non-interactive user sign-ins?
Mar 24, 2023 Kiril Non-interactive user sign-ins are sign-ins that are performed by a client app or an OS component on behalf of a user These sign-ins don't require any interaction or authentication factor from the user For example, authentication and authorization using refresh and access tokens that don't require a user to enter credentials
- Signins: Login status = success but Conditional access = failed?
I believe i can explain this behavior The Conditional Access block action for ActiveSync is unique It does not fail the sign in with Azure AD, it signals Exchange to perform a quarantine on the device The user is able to successfully configure the AS connection, but rather than get access to anything they see a single email stating that ActiveSync is not permitted This is very similar to
- Token Protection - getting unbound for admin user
I've been looking and the Conditional Access Policy for Token Protection but before implementing I checked Azure Sign-In logs What I found is that when I use mu admin credentials (different than my user credentials) to access for example Azure Portal, Token Protection Sign in Session value is "Unbound"
- Login failed with Sign-in was blocked because it came from an . . .
Login failed with Sign-in was blocked because it came from an IP address with malicious activity Hello, I'm looking for a definitive, authoritative answer to what exactly entails a Azure AD login failed with the message " Sign-in was blocked because it came from an IP address with malicious activity" Errore code 50053
|
|
|