learn.microsoft.com
Open in
urlscan Pro
23.57.86.58
Public Scan
Submitted URL: http://docs.microsoft.com/azure/active-directory/reports-monitoring/reference-sign-ins-error-codes
Effective URL: https://learn.microsoft.com/en-us/entra/identity/monitoring-health/concept-sign-ins
Submission: On June 18 via api from SE — Scanned from SE
Effective URL: https://learn.microsoft.com/en-us/entra/identity/monitoring-health/concept-sign-ins
Submission: On June 18 via api from SE — Scanned from SE
Form analysis
3 forms found in the DOMName: site-header-search-form-mobile — GET /en-us/search/
<form class="flex-grow-1" method="GET" role="search" id="ms--site-header-search-form-mobile" data-bi-name="site-header-search-form-mobile" name="site-header-search-form-mobile" aria-label="Search" action="/en-us/search/">
<div class="autocomplete display-block" data-bi-name="autocomplete"><!---->
<div class="field-body control ">
<input role="combobox" maxlength="100" aria-autocomplete="list" autocapitalize="off" autocomplete="off" autocorrect="off" spellcheck="false" id="site-header-search-autocomplete-input-mobile"
data-test-id="site-header-search-autocomplete-input-mobile" class="autocomplete-input input
width-full" type="search" name="terms" aria-expanded="false" aria-owns="ax-1-listbox" aria-controls="ax-1-listbox" aria-activedescendant="" aria-label="Search" aria-describedby="ms--site-header-search-autocomplete-input-mobile-description"
placeholder="Search" data-bi-name="site-header-search-autocomplete-input-mobile" pattern=".*">
<span aria-hidden="true" class="autocomplete-loader loader has-text-primary " hidden=""></span>
<span hidden="" id="ms--site-header-search-autocomplete-input-mobile-description"> Suggestions will filter as you type </span>
</div>
<ul role="listbox" id="ax-1-listbox" data-test-id="site-header-search-autocomplete-input-mobile-listbox" class="autocomplete-suggestions is-vertically-scrollable padding-xxs " aria-label="Suggestions" hidden="">
</ul>
<!---->
</div>
<!-- mobile safari will not dispatch submit event unless there's a submit button that is not display:none -->
<button type="submit" class="visually-hidden" tabindex="-1" aria-hidden="true"></button>
<input name="category" hidden="" value="">
</form>
Name: site-header-search-form — GET /en-us/search/
<form class="flex-grow-1" method="GET" role="search" id="ms--site-header-search-form" data-bi-name="site-header-search-form" name="site-header-search-form" aria-label="Search" action="/en-us/search/">
<div class="autocomplete display-block" data-bi-name="autocomplete"><!---->
<div class="field-body control ">
<input role="combobox" maxlength="100" aria-autocomplete="list" autocapitalize="off" autocomplete="off" autocorrect="off" spellcheck="false" id="site-header-search-autocomplete-input" data-test-id="site-header-search-autocomplete-input" class="autocomplete-input input input-sm
width-full" type="search" name="terms" aria-expanded="false" aria-owns="ax-0-listbox" aria-controls="ax-0-listbox" aria-activedescendant="" aria-label="Search" aria-describedby="ms--site-header-search-autocomplete-input-description"
placeholder="Search" data-bi-name="site-header-search-autocomplete-input" pattern=".*">
<span aria-hidden="true" class="autocomplete-loader loader has-text-primary " hidden=""></span>
<span hidden="" id="ms--site-header-search-autocomplete-input-description"> Suggestions will filter as you type </span>
</div>
<ul role="listbox" id="ax-0-listbox" data-test-id="site-header-search-autocomplete-input-listbox" class="autocomplete-suggestions is-vertically-scrollable padding-xxs " aria-label="Suggestions" hidden="">
</ul>
<!---->
</div>
<!-- mobile safari will not dispatch submit event unless there's a submit button that is not display:none -->
<button type="submit" class="visually-hidden" tabindex="-1" aria-hidden="true"></button>
<input name="category" hidden="" value="">
</form>
javascript:
<form action="javascript:" role="search" aria-label="Search" class="margin-bottom-xxs"><label class="visually-hidden" for="ax-2">Search</label>
<div class="autocomplete display-block" data-bi-name="autocomplete"><!---->
<div class="field-body control has-icons-left">
<input role="combobox" maxlength="100" aria-autocomplete="list" autocapitalize="off" autocomplete="off" autocorrect="off" spellcheck="false" id="ax-2" data-test-id="ax-2" class="autocomplete-input input input-sm
control has-icons-left
width-full" type="text" aria-expanded="false" aria-owns="ax-3-listbox" aria-controls="ax-3-listbox" aria-activedescendant="" aria-describedby="ms--ax-2-description" placeholder="Filter by title" pattern=".*">
<span aria-hidden="true" class="icon is-small is-left">
<span class="has-text-primary docon docon-filter-settings"></span>
</span>
<span aria-hidden="true" class="autocomplete-loader loader has-text-primary " hidden=""></span>
<span hidden="" id="ms--ax-2-description"> Suggestions will filter as you type </span>
</div>
<ul role="listbox" id="ax-3-listbox" data-test-id="ax-2-listbox" class="autocomplete-suggestions is-vertically-scrollable padding-xxs " aria-label="Suggestions" hidden="">
</ul>
<!---->
</div>
</form>
Text Content
Skip to main content We use optional cookies to improve your experience on our websites, such as through social media connections, and to display personalized advertising based on your online activity. If you reject optional cookies, only cookies necessary to provide you the services will be used. You may change your selection by clicking “Manage Cookies” at the bottom of the page. Privacy Statement Third-Party Cookies Accept Reject Manage cookies This browser is no longer supported. Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support. Download Microsoft Edge More info about Internet Explorer and Microsoft Edge Learn Suggestions will filter as you type Sign in * Profile * Settings Sign out Learn * Discover * Documentation In-depth articles on Microsoft developer tools and technologies * Training Personalized learning paths and courses * Credentials Globally recognized, industry-endorsed credentials * Q&A Technical questions and answers moderated by Microsoft * Code Samples Code sample library for Microsoft developer tools and technologies * Assessments Interactive, curated guidance and recommendations * Shows Thousands of hours of original programming from Microsoft experts Featured assessment It's your AI learning journey Wherever you are in your AI journey, Microsoft Learn meets you where you are and helps you deepen your skills. * Product documentation * ASP.NET * Azure * Dynamics 365 * Microsoft 365 * Microsoft Edge * Microsoft Entra * Microsoft Graph * Microsoft Intune * Microsoft Purview * Microsoft Teams * .NET * Power Apps * Power Automate * Power BI * Power Platform * PowerShell * SQL * Sysinternals * Visual Studio * Windows * Windows Server View all products Featured assessment It's your AI learning journey Wherever you are in your AI journey, Microsoft Learn meets you where you are and helps you deepen your skills. * Development languages * C++ * C# * DAX * Java * OData * OpenAPI * Power Query M * VBA Featured assessment It's your AI learning journey Wherever you are in your AI journey, Microsoft Learn meets you where you are and helps you deepen your skills. * Topics * Artificial intelligence * Compliance * DevOps * Platform engineering * Security Featured assessment It's your AI learning journey Wherever you are in your AI journey, Microsoft Learn meets you where you are and helps you deepen your skills. Suggestions will filter as you type Sign in * Profile * Settings Sign out Microsoft Entra * Microsoft Entra ID * External ID * Global Secure Access * ID Governance * Permissions Management * Microsoft Security documentation * More * Microsoft Entra ID * External ID * Global Secure Access * ID Governance * Permissions Management * Microsoft Security documentation Admin center Table of contents Exit focus mode Search Suggestions will filter as you type * Monitoring and health documentation * Overview * Identity Monitoring and health * Identity Recommendations * Identity Workbooks * Identity logs * Concepts * Audit logs * Sign-in logs * Sign-in log activity details * Provisioning logs * Microsoft Graph activity logs * How-to guides * Access activity logs * Analyze provisioning logs * Analyze activity logs with Microsoft Graph * Archive logs to a storage account * Customize and filter activity logs * Download logs * Quickstarts * Identity reports * Concepts * How-to guides * How to use Identity Recommendations * How to use Identity Workbooks * Recommendations * Workbooks * Identity monitoring * Concepts * How-to guides * Configure diagnostic settings * Stream logs to an event hub * Configure a Log Analytics workspace * Integrate activity logs with Azure Monitor logs * Analyze activity logs in Azure Monitor logs * Common troubleshooting scenarios * Reference Download PDF 1. Learn 2. Microsoft Entra 3. Microsoft Entra ID 4. Monitoring and health 1. Learn 2. Microsoft Entra 3. Microsoft Entra ID 4. Monitoring and health Read in English Save * Add to Collections * Add to Plan Table of contents Read in English Add to Collections Add to Plan Edit -------------------------------------------------------------------------------- SHARE VIA Facebook x.com LinkedIn Email -------------------------------------------------------------------------------- Print Table of contents WHAT ARE MICROSOFT ENTRA SIGN-IN LOGS? * Article * 03/01/2024 * 27 contributors Feedback IN THIS ARTICLE 1. License and role requirements 2. What can you do with sign-in logs? 3. What are the types of sign-in logs? 4. Sign-in data used by other services Microsoft Entra logs all sign-ins into an Azure tenant, which includes your internal apps and resources. As an IT administrator, you need to know what the values in the sign-in logs mean, so that you can interpret the log values correctly. Reviewing sign-in errors and patterns provides valuable insight into how your users access applications and services. The sign-in logs provided by Microsoft Entra ID are a powerful type of activity log that you can analyze. This article explains how to access and utilize the sign-in logs. The preview view of the sign-in logs includes interactive and non-interactive user sign-ins as well as service principal and managed identity sign-ins. You can still view the classic sign-in logs, which only include interactive sign-ins. Two other activity logs are also available to help monitor the health of your tenant: * Audit – Information about changes applied to your tenant, such as users and group management or updates applied to your tenant’s resources. * Provisioning – Activities performed by a provisioning service, such as the creation of a group in ServiceNow or a user imported from Workday. LICENSE AND ROLE REQUIREMENTS The required roles and licenses vary based on the report. Separate permissions are required to access monitoring and health data in Microsoft Graph. We recommend using a role with least privilege access to align with the Zero Trust guidance. Expand table Log / Report Roles Licenses Audit Reports Reader Security Reader Security Administrator Global Reader All editions of Microsoft Entra ID Sign-ins Reports Reader Security Reader Security Administrator Global Reader All editions of Microsoft Entra ID Provisioning Reports Reader Security Reader Security Administrator Global Reader Security Operator Application Administrator Cloud App Administrator Microsoft Entra ID P1 or P2 Custom security attribute audit logs* Attribute Log Administrator Attribute Log Reader All editions of Microsoft Entra ID Usage and insights Reports Reader Security Reader Security Administrator Microsoft Entra ID P1 or P2 Identity Protection** Security Administrator Security Operator Security Reader Global Reader Microsoft Entra ID Free Microsoft 365 Apps Microsoft Entra ID P1 or P2 Microsoft Graph activity logs Security Administrator Permissions to access data in the corresponding log destination Microsoft Entra ID P1 or P2 *Viewing the custom security attributes in the audit logs or creating diagnostic settings for custom security attributes requires one of the Attribute Log roles. You also need the appropriate role to view the standard audit logs. **The level of access and capabilities for Identity Protection varies with the role and license. For more information, see the license requirements for Identity Protection. WHAT CAN YOU DO WITH SIGN-IN LOGS? You can use the sign-in logs to answer questions such as: * How many users signed into a particular application this week? * How many failed sign-in attempts occurred in the last 24 hours? * Are users signing in from specific browsers or operating systems? * Which of my Azure resources were accessed by managed identities and service principals? You can also describe the activity associated with a sign-in request by identifying the following details: * Who – The identity (User) performing the sign-in. * How – The client (Application) used for the sign-in. * What – The target (Resource) accessed by the identity. WHAT ARE THE TYPES OF SIGN-IN LOGS? There are four types of logs in the sign-in logs preview: * Interactive user sign-ins * Non-interactive user sign-ins * Service principal sign-ins * Managed identity sign-ins The classic sign-in logs only include interactive user sign-ins. Note Entries in the sign-in logs are system generated and can't be changed or deleted. INTERACTIVE USER SIGN-INS Interactive sign-ins are performed by a user. They provide an authentication factor to Microsoft Entra ID. That authentication factor could also interact with a helper app, such as the Microsoft Authenticator app. Users can provide passwords, responses to MFA challenges, biometric factors, or QR codes to Microsoft Entra ID or to a helper app. This log also includes federated sign-ins from identity providers that are federated to Microsoft Entra ID. Report size: small Examples: * A user provides username and password in the Microsoft Entra sign-in screen. * A user passes an SMS MFA challenge. * A user provides a biometric gesture to unlock their Windows PC with Windows Hello for Business. * A user is federated to Microsoft Entra ID with an AD FS SAML assertion. In addition to the default fields, the interactive sign-in log also shows: * The sign-in location * Whether Conditional Access was applied SPECIAL CONSIDERATIONS Non-interactive sign-ins on the interactive sign-in logs Previously, some non-interactive sign-ins from Microsoft Exchange clients were included in the interactive user sign-in log for better visibility. This increased visibility was necessary before the non-interactive user sign-in logs were introduced in November 2020. However, it's important to note that some non-interactive sign-ins, such as those using FIDO2 keys, might still be marked as interactive due to the way the system was set up before the separate non-interactive logs were introduced. These sign-ins might display interactive details like client credential type and browser information, even though they're technically non-interactive sign-ins. Passthrough sign-ins Microsoft Entra ID issues tokens for authentication and authorization. In some situations, a user who is signed in to the Contoso tenant might try to access resources in the Fabrikam tenant, where they don't have access. A no-authorization token called a passthrough token, is issued to the Fabrikam tenant. The passthrough token doesn't allow the user to access any resources. Previously, when reviewing the logs for this situation, the sign-in logs for the home tenant (in this scenario, Contoso) didn't show a sign-in attempt because the token wasn't granting access to a resource with any claims. The sign-in token was only used to display the appropriate failure message. Passthrough sign-in attempts now appear in the home tenant sign-in logs and any relevant tenant restriction sign-in logs. This update provides more visibility into user sign-in attempts from your users and deeper insights into your tenant restriction policies. The crossTenantAccessType property now shows passthrough to differentiate passthrough sign-ins and is available in the Microsoft Entra admin center and Microsoft Graph. First-party, app-only service principal sign-ins The service principal sign-in logs don't include first-party, app-only sign-in activity. This type of activity happens when first-party apps get tokens for an internal Microsoft job where there's no direction or context from a user. We exclude these logs so you're not paying for logs related to internal Microsoft tokens within your tenant. You might identify Microsoft Graph events that don't correlate to a service principal sign-in if you're routing MicrosoftGraphActivityLogs with SignInLogs to the same Log Analytics workspace. This integration allows you to cross reference the token issued for the Microsoft Graph API call with the sign-in activity. The UniqueTokenIdentifier for sign-in logs and the SignInActivityId in the Microsoft Graph activity logs would be missing from the service principal sign-in logs. NON-INTERACTIVE USER SIGN-INS Non-interactive sign-ins are done on behalf of a user. These delegated sign-ins were performed by a client app or OS components on behalf of a user and don't require the user to provide an authentication factor. Instead, Microsoft Entra ID recognizes when the user's token needs to be refreshed and does so behind the scenes, without interrupting the user's session. In general, the user perceives these sign-ins as happening in the background. Report size: Large Examples: * A client app uses an OAuth 2.0 refresh token to get an access token. * A client uses an OAuth 2.0 authorization code to get an access token and refresh token. * A user performs single sign-on (SSO) to a web or Windows app on a Microsoft Entra joined PC (without providing an authentication factor or interacting with a Microsoft Entra prompt). * A user signs in to a second Microsoft Office app while they have a session on a mobile device using FOCI (Family of Client IDs). In addition to the default fields, the non-interactive sign-in log also shows: * Resource ID * Number of grouped sign-ins You can't customize the fields shown in this report. To make it easier to digest the data, non-interactive sign-in events are grouped. Clients often create many non-interactive sign-ins on behalf of the same user in a short time period. The non-interactive sign-ins share the same characteristics except for the time the sign-in was attempted. For example, a client might get an access token once per hour on behalf of a user. If the state of the user or client doesn't change, the IP address, resource, and all other information is the same for each access token request. The only state that does change is the date and time of the sign-in. When Microsoft Entra logs multiple sign-ins that are identical other than time and date, those sign-ins are from the same entity and are aggregated into a single row. A row with multiple identical sign-ins (except for date and time issued) has a value greater than one in the # sign-ins column. These aggregated sign-ins might also appear to have the same time stamps. The Time aggregate filter can set to 1 hour, 6 hours, or 24 hours. You can expand the row to see all the different sign-ins and their different time stamps. Sign-ins are aggregated in the non-interactive users when the following data matches: * Application * User * IP address * Status * Resource ID Note The IP address of non-interactive sign-ins performed by confidential clients doesn't match the actual source IP of where the refresh token request is coming from. Instead, it shows the original IP used for the original token issuance. SERVICE PRINCIPAL SIGN-INS Unlike interactive and non-interactive user sign-ins, service principal sign-ins don't involve a user. Instead, they're sign-ins by any nonuser account, such as apps or service principals (except managed identity sign-in, which are in included only in the managed identity sign-in log). In these sign-ins, the app or service provides its own credential, such as a certificate or app secret to authenticate or access resources. Report size: Large Examples: * A service principal uses a certificate to authenticate and access the Microsoft Graph. * An application uses a client secret to authenticate in the OAuth Client Credentials flow. You can't customize the fields shown in this report. To make it easier to digest the data in the service principal sign-in logs, service principal sign-in events are grouped. Sign-ins from the same entity under the same conditions are aggregated into a single row. You can expand the row to see all the different sign-ins and their different time stamps. Sign-ins are aggregated in the service principal report when the following data matches: * Service principal name or ID * Status * IP address * Resource name or ID MANAGED IDENTITY SIGN-INS Managed identities for Azure resources sign-ins are sign-ins that were performed by resources that have their secrets managed by Azure to simplify credential management. A VM with managed credentials uses Microsoft Entra ID to get an Access Token. Report size: Small Examples: You can't customize the fields shown in this report. To make it easier to digest the data, managed identities for Azure resources sign-in logs, non-interactive sign-in events are grouped. Sign-ins from the same entity are aggregated into a single row. You can expand the row to see all the different sign-ins and their different time stamps. Sign-ins are aggregated in the managed identities report when all of the following data matches: * Managed identity name or ID * Status * Resource name or ID Select an item in the list view to display all sign-ins that are grouped under a node. Select a grouped item to see all details of the sign-in. SIGN-IN DATA USED BY OTHER SERVICES Sign-in data is used by several services in Azure to monitor risky sign-ins, provide insight into application usage, and more. MICROSOFT ENTRA ID PROTECTION Sign-in log data visualization that relates to risky sign-ins is available in the Microsoft Entra ID Protection overview, which uses the following data: * Risky users * Risky user sign-ins * Risky workload identities For more information about the Microsoft Entra ID Protection tools, see the Microsoft Entra ID Protection overview. MICROSOFT ENTRA USAGE AND INSIGHTS To view application-specific sign-in data, browse to Microsoft Entra ID > Monitoring & health > Usage & insights. These reports provide a closer look at sign-ins for Microsoft Entra application activity and AD FS application activity. For more information, see Microsoft Entra Usage & insights. There are several reports available in Usage & insights. Some of these reports are in preview. * Microsoft Entra application activity (preview) * AD FS application activity * Authentication methods activity * Service principal sign-in activity * Application credential activity MICROSOFT 365 ACTIVITY LOGS You can view Microsoft 365 activity logs from the Microsoft 365 admin center. Microsoft 365 activity and Microsoft Entra activity logs share a significant number of directory resources. Only the Microsoft 365 admin center provides a full view of the Microsoft 365 activity logs. You can access the Microsoft 365 activity logs programmatically by using the Office 365 Management APIs. -------------------------------------------------------------------------------- FEEDBACK Was this page helpful? Yes No Provide product feedback FEEDBACK Coming soon: Throughout 2024 we will be phasing out GitHub Issues as the feedback mechanism for content and replacing it with a new feedback system. For more information see: https://aka.ms/ContentUserFeedback. Submit and view feedback for This product This page View all page feedback -------------------------------------------------------------------------------- ADDITIONAL RESOURCES -------------------------------------------------------------------------------- Training Module Monitor and maintain Microsoft Entra ID - Training Audit and diagnostic logs within Microsoft Entra ID provide a rich view into how users are accessing your Azure solution. Learn to monitor, troubleshoot, and analyze sign-in data. Certification Microsoft Certified: Identity and Access Administrator Associate - Certifications Demonstrate the features of Microsoft Entra ID to modernize identity solutions, implement hybrid solutions, and implement identity governance. English (United States) California Consumer Privacy Act (CCPA) Opt-Out Icon Your Privacy Choices Theme * Light * Dark * High contrast * Manage cookies * Previous Versions * Blog * Contribute * Privacy * Terms of Use * Trademarks * © Microsoft 2024 ADDITIONAL RESOURCES -------------------------------------------------------------------------------- Training Module Monitor and maintain Microsoft Entra ID - Training Audit and diagnostic logs within Microsoft Entra ID provide a rich view into how users are accessing your Azure solution. Learn to monitor, troubleshoot, and analyze sign-in data. Certification Microsoft Certified: Identity and Access Administrator Associate - Certifications Demonstrate the features of Microsoft Entra ID to modernize identity solutions, implement hybrid solutions, and implement identity governance. IN THIS ARTICLE English (United States) California Consumer Privacy Act (CCPA) Opt-Out Icon Your Privacy Choices Theme * Light * Dark * High contrast * Manage cookies * Previous Versions * Blog * Contribute * Privacy * Terms of Use * Trademarks * © Microsoft 2024