learn.microsoft.com Open in urlscan Pro
23.57.86.58  Public Scan

Submitted URL: http://docs.microsoft.com/azure/active-directory/reports-monitoring/reference-sign-ins-error-codes
Effective URL: https://learn.microsoft.com/en-us/entra/identity/monitoring-health/concept-sign-ins
Submission: On June 18 via api from SE — Scanned from SE

Form analysis 3 forms found in the DOM

Name: site-header-search-form-mobileGET /en-us/search/

<form class="flex-grow-1" method="GET" role="search" id="ms--site-header-search-form-mobile" data-bi-name="site-header-search-form-mobile" name="site-header-search-form-mobile" aria-label="Search" action="/en-us/search/">
  <div class="autocomplete display-block" data-bi-name="autocomplete"><!---->
    <div class="field-body control ">
      <input role="combobox" maxlength="100" aria-autocomplete="list" autocapitalize="off" autocomplete="off" autocorrect="off" spellcheck="false" id="site-header-search-autocomplete-input-mobile"
        data-test-id="site-header-search-autocomplete-input-mobile" class="autocomplete-input input 
						
						width-full" type="search" name="terms" aria-expanded="false" aria-owns="ax-1-listbox" aria-controls="ax-1-listbox" aria-activedescendant="" aria-label="Search" aria-describedby="ms--site-header-search-autocomplete-input-mobile-description"
        placeholder="Search" data-bi-name="site-header-search-autocomplete-input-mobile" pattern=".*">
      <span aria-hidden="true" class="autocomplete-loader loader has-text-primary " hidden=""></span>
      <span hidden="" id="ms--site-header-search-autocomplete-input-mobile-description"> Suggestions will filter as you type </span>
    </div>
    <ul role="listbox" id="ax-1-listbox" data-test-id="site-header-search-autocomplete-input-mobile-listbox" class="autocomplete-suggestions is-vertically-scrollable padding-xxs " aria-label="Suggestions" hidden="">
    </ul>
    <!---->
  </div>
  <!-- mobile safari will not dispatch submit event unless there's a submit button that is not display:none -->
  <button type="submit" class="visually-hidden" tabindex="-1" aria-hidden="true"></button>
  <input name="category" hidden="" value="">
</form>

Name: site-header-search-formGET /en-us/search/

<form class="flex-grow-1" method="GET" role="search" id="ms--site-header-search-form" data-bi-name="site-header-search-form" name="site-header-search-form" aria-label="Search" action="/en-us/search/">
  <div class="autocomplete display-block" data-bi-name="autocomplete"><!---->
    <div class="field-body control ">
      <input role="combobox" maxlength="100" aria-autocomplete="list" autocapitalize="off" autocomplete="off" autocorrect="off" spellcheck="false" id="site-header-search-autocomplete-input" data-test-id="site-header-search-autocomplete-input" class="autocomplete-input input input-sm
						
						width-full" type="search" name="terms" aria-expanded="false" aria-owns="ax-0-listbox" aria-controls="ax-0-listbox" aria-activedescendant="" aria-label="Search" aria-describedby="ms--site-header-search-autocomplete-input-description"
        placeholder="Search" data-bi-name="site-header-search-autocomplete-input" pattern=".*">
      <span aria-hidden="true" class="autocomplete-loader loader has-text-primary " hidden=""></span>
      <span hidden="" id="ms--site-header-search-autocomplete-input-description"> Suggestions will filter as you type </span>
    </div>
    <ul role="listbox" id="ax-0-listbox" data-test-id="site-header-search-autocomplete-input-listbox" class="autocomplete-suggestions is-vertically-scrollable padding-xxs " aria-label="Suggestions" hidden="">
    </ul>
    <!---->
  </div>
  <!-- mobile safari will not dispatch submit event unless there's a submit button that is not display:none -->
  <button type="submit" class="visually-hidden" tabindex="-1" aria-hidden="true"></button>
  <input name="category" hidden="" value="">
</form>

javascript:

<form action="javascript:" role="search" aria-label="Search" class="margin-bottom-xxs"><label class="visually-hidden" for="ax-2">Search</label>
  <div class="autocomplete display-block" data-bi-name="autocomplete"><!---->
    <div class="field-body control has-icons-left">
      <input role="combobox" maxlength="100" aria-autocomplete="list" autocapitalize="off" autocomplete="off" autocorrect="off" spellcheck="false" id="ax-2" data-test-id="ax-2" class="autocomplete-input input input-sm
						control has-icons-left
						width-full" type="text" aria-expanded="false" aria-owns="ax-3-listbox" aria-controls="ax-3-listbox" aria-activedescendant="" aria-describedby="ms--ax-2-description" placeholder="Filter by title" pattern=".*">
      <span aria-hidden="true" class="icon is-small is-left">
        <span class="has-text-primary docon docon-filter-settings"></span>
      </span>
      <span aria-hidden="true" class="autocomplete-loader loader has-text-primary " hidden=""></span>
      <span hidden="" id="ms--ax-2-description"> Suggestions will filter as you type </span>
    </div>
    <ul role="listbox" id="ax-3-listbox" data-test-id="ax-2-listbox" class="autocomplete-suggestions is-vertically-scrollable padding-xxs " aria-label="Suggestions" hidden="">
    </ul>
    <!---->
  </div>
</form>

Text Content

Skip to main content

We use optional cookies to improve your experience on our websites, such as
through social media connections, and to display personalized advertising based
on your online activity. If you reject optional cookies, only cookies necessary
to provide you the services will be used. You may change your selection by
clicking “Manage Cookies” at the bottom of the page. Privacy Statement
Third-Party Cookies

Accept Reject Manage cookies

This browser is no longer supported.

Upgrade to Microsoft Edge to take advantage of the latest features, security
updates, and technical support.

Download Microsoft Edge More info about Internet Explorer and Microsoft Edge

Learn
Suggestions will filter as you type
Sign in


 * Profile
 * Settings

Sign out

Learn
   
 * Discover
      
    * Documentation
      
      In-depth articles on Microsoft developer tools and technologies
   
      
    * Training
      
      Personalized learning paths and courses
   
      
    * Credentials
      
      Globally recognized, industry-endorsed credentials
   
      
    * Q&A
      
      Technical questions and answers moderated by Microsoft
   
      
    * Code Samples
      
      Code sample library for Microsoft developer tools and technologies
   
      
    * Assessments
      
      Interactive, curated guidance and recommendations
   
      
    * Shows
      
      Thousands of hours of original programming from Microsoft experts
   
      
   
   Featured assessment
   
   It's your AI learning journey
   
   Wherever you are in your AI journey, Microsoft Learn meets you where you are
   and helps you deepen your skills.

   
 * Product documentation
      
    * ASP.NET
      
    * Azure
      
    * Dynamics 365
      
    * Microsoft 365
      
    * Microsoft Edge
      
    * Microsoft Entra
      
    * Microsoft Graph
      
    * Microsoft Intune
      
    * Microsoft Purview
      
    * Microsoft Teams
      
    * .NET
      
    * Power Apps
      
    * Power Automate
      
    * Power BI
      
    * Power Platform
      
    * PowerShell
      
    * SQL
      
    * Sysinternals
      
    * Visual Studio
      
    * Windows
      
    * Windows Server
      
   
   View all products
   
   Featured assessment
   
   It's your AI learning journey
   
   Wherever you are in your AI journey, Microsoft Learn meets you where you are
   and helps you deepen your skills.

   
 * Development languages
      
    * C++
      
    * C#
      
    * DAX
      
    * Java
      
    * OData
      
    * OpenAPI
      
    * Power Query M
      
    * VBA
      
   
   Featured assessment
   
   It's your AI learning journey
   
   Wherever you are in your AI journey, Microsoft Learn meets you where you are
   and helps you deepen your skills.

   
 * Topics
      
    * Artificial intelligence
      
    * Compliance
      
    * DevOps
      
    * Platform engineering
      
    * Security
      
   
   Featured assessment
   
   It's your AI learning journey
   
   Wherever you are in your AI journey, Microsoft Learn meets you where you are
   and helps you deepen your skills.

   

Suggestions will filter as you type
Sign in


 * Profile
 * Settings

Sign out
Microsoft Entra
   
 * Microsoft Entra ID
   
 * External ID
   
 * Global Secure Access
   
 * ID Governance
   
 * Permissions Management
   
 * Microsoft Security documentation
   
 * More
     
   * Microsoft Entra ID
     
   * External ID
     
   * Global Secure Access
     
   * ID Governance
     
   * Permissions Management
     
   * Microsoft Security documentation
     
   

Admin center
Table of contents Exit focus mode

Search
Suggestions will filter as you type
 * Monitoring and health documentation
 * Overview
   * Identity Monitoring and health
   * Identity Recommendations
   * Identity Workbooks
 * Identity logs
   * Concepts
     * Audit logs
     * Sign-in logs
     * Sign-in log activity details
     * Provisioning logs
     * Microsoft Graph activity logs
   * How-to guides
     * Access activity logs
     * Analyze provisioning logs
     * Analyze activity logs with Microsoft Graph
     * Archive logs to a storage account
     * Customize and filter activity logs
     * Download logs
   * Quickstarts
 * Identity reports
   * Concepts
   * How-to guides
     * How to use Identity Recommendations
     * How to use Identity Workbooks
   * Recommendations
   * Workbooks
 * Identity monitoring
   * Concepts
   * How-to guides
     * Configure diagnostic settings
     * Stream logs to an event hub
     * Configure a Log Analytics workspace
     * Integrate activity logs with Azure Monitor logs
     * Analyze activity logs in Azure Monitor logs
 * Common troubleshooting scenarios
 * Reference

Download PDF
    
 1. Learn
    
    
 2. Microsoft Entra
    
    
 3. Microsoft Entra ID
    
    
 4. Monitoring and health
    

    
 1. Learn
    
    
 2. Microsoft Entra
    
    
 3. Microsoft Entra ID
    
    
 4. Monitoring and health
    

Read in English Save
 * Add to Collections
 * Add to Plan

Table of contents Read in English Add to Collections Add to Plan Edit


--------------------------------------------------------------------------------

SHARE VIA

Facebook x.com LinkedIn Email

--------------------------------------------------------------------------------

Print
Table of contents


WHAT ARE MICROSOFT ENTRA SIGN-IN LOGS?

 * Article
 * 03/01/2024
 * 27 contributors

Feedback


IN THIS ARTICLE

    
 1. License and role requirements
    
 2. What can you do with sign-in logs?
    
 3. What are the types of sign-in logs?
    
 4. Sign-in data used by other services
    

Microsoft Entra logs all sign-ins into an Azure tenant, which includes your
internal apps and resources. As an IT administrator, you need to know what the
values in the sign-in logs mean, so that you can interpret the log values
correctly.

Reviewing sign-in errors and patterns provides valuable insight into how your
users access applications and services. The sign-in logs provided by Microsoft
Entra ID are a powerful type of activity log that you can analyze. This article
explains how to access and utilize the sign-in logs.

The preview view of the sign-in logs includes interactive and non-interactive
user sign-ins as well as service principal and managed identity sign-ins. You
can still view the classic sign-in logs, which only include interactive
sign-ins.

Two other activity logs are also available to help monitor the health of your
tenant:

 * Audit – Information about changes applied to your tenant, such as users and
   group management or updates applied to your tenant’s resources.
 * Provisioning – Activities performed by a provisioning service, such as the
   creation of a group in ServiceNow or a user imported from Workday.


LICENSE AND ROLE REQUIREMENTS

The required roles and licenses vary based on the report. Separate permissions
are required to access monitoring and health data in Microsoft Graph. We
recommend using a role with least privilege access to align with the Zero Trust
guidance.

Expand table

Log / Report Roles Licenses Audit Reports Reader
Security Reader
Security Administrator
Global Reader
All editions of Microsoft Entra ID Sign-ins Reports Reader
Security Reader
Security Administrator
Global Reader
All editions of Microsoft Entra ID Provisioning Reports Reader
Security Reader
Security Administrator
Global Reader
Security Operator
Application Administrator
Cloud App Administrator
Microsoft Entra ID P1 or P2 Custom security attribute audit logs* Attribute Log
Administrator
Attribute Log Reader All editions of Microsoft Entra ID Usage and insights
Reports Reader
Security Reader
Security Administrator Microsoft Entra ID P1 or P2 Identity Protection**
Security Administrator
Security Operator
Security Reader
Global Reader
Microsoft Entra ID Free
Microsoft 365 Apps
Microsoft Entra ID P1 or P2 Microsoft Graph activity logs Security Administrator
Permissions to access data in the corresponding log destination Microsoft Entra
ID P1 or P2

*Viewing the custom security attributes in the audit logs or creating diagnostic
settings for custom security attributes requires one of the Attribute Log roles.
You also need the appropriate role to view the standard audit logs.

**The level of access and capabilities for Identity Protection varies with the
role and license. For more information, see the license requirements for
Identity Protection.


WHAT CAN YOU DO WITH SIGN-IN LOGS?

You can use the sign-in logs to answer questions such as:

 * How many users signed into a particular application this week?
 * How many failed sign-in attempts occurred in the last 24 hours?
 * Are users signing in from specific browsers or operating systems?
 * Which of my Azure resources were accessed by managed identities and service
   principals?

You can also describe the activity associated with a sign-in request by
identifying the following details:

 * Who – The identity (User) performing the sign-in.
 * How – The client (Application) used for the sign-in.
 * What – The target (Resource) accessed by the identity.


WHAT ARE THE TYPES OF SIGN-IN LOGS?

There are four types of logs in the sign-in logs preview:

 * Interactive user sign-ins
 * Non-interactive user sign-ins
 * Service principal sign-ins
 * Managed identity sign-ins

The classic sign-in logs only include interactive user sign-ins.

Note

Entries in the sign-in logs are system generated and can't be changed or
deleted.


INTERACTIVE USER SIGN-INS

Interactive sign-ins are performed by a user. They provide an authentication
factor to Microsoft Entra ID. That authentication factor could also interact
with a helper app, such as the Microsoft Authenticator app. Users can provide
passwords, responses to MFA challenges, biometric factors, or QR codes to
Microsoft Entra ID or to a helper app. This log also includes federated sign-ins
from identity providers that are federated to Microsoft Entra ID.



Report size: small
Examples:

 * A user provides username and password in the Microsoft Entra sign-in screen.
 * A user passes an SMS MFA challenge.
 * A user provides a biometric gesture to unlock their Windows PC with Windows
   Hello for Business.
 * A user is federated to Microsoft Entra ID with an AD FS SAML assertion.

In addition to the default fields, the interactive sign-in log also shows:

 * The sign-in location
 * Whether Conditional Access was applied

SPECIAL CONSIDERATIONS

Non-interactive sign-ins on the interactive sign-in logs

Previously, some non-interactive sign-ins from Microsoft Exchange clients were
included in the interactive user sign-in log for better visibility. This
increased visibility was necessary before the non-interactive user sign-in logs
were introduced in November 2020. However, it's important to note that some
non-interactive sign-ins, such as those using FIDO2 keys, might still be marked
as interactive due to the way the system was set up before the separate
non-interactive logs were introduced. These sign-ins might display interactive
details like client credential type and browser information, even though they're
technically non-interactive sign-ins.

Passthrough sign-ins

Microsoft Entra ID issues tokens for authentication and authorization. In some
situations, a user who is signed in to the Contoso tenant might try to access
resources in the Fabrikam tenant, where they don't have access. A
no-authorization token called a passthrough token, is issued to the Fabrikam
tenant. The passthrough token doesn't allow the user to access any resources.

Previously, when reviewing the logs for this situation, the sign-in logs for the
home tenant (in this scenario, Contoso) didn't show a sign-in attempt because
the token wasn't granting access to a resource with any claims. The sign-in
token was only used to display the appropriate failure message.

Passthrough sign-in attempts now appear in the home tenant sign-in logs and any
relevant tenant restriction sign-in logs. This update provides more visibility
into user sign-in attempts from your users and deeper insights into your tenant
restriction policies.

The crossTenantAccessType property now shows passthrough to differentiate
passthrough sign-ins and is available in the Microsoft Entra admin center and
Microsoft Graph.

First-party, app-only service principal sign-ins

The service principal sign-in logs don't include first-party, app-only sign-in
activity. This type of activity happens when first-party apps get tokens for an
internal Microsoft job where there's no direction or context from a user. We
exclude these logs so you're not paying for logs related to internal Microsoft
tokens within your tenant.

You might identify Microsoft Graph events that don't correlate to a service
principal sign-in if you're routing MicrosoftGraphActivityLogs with SignInLogs
to the same Log Analytics workspace. This integration allows you to cross
reference the token issued for the Microsoft Graph API call with the sign-in
activity. The UniqueTokenIdentifier for sign-in logs and the SignInActivityId in
the Microsoft Graph activity logs would be missing from the service principal
sign-in logs.


NON-INTERACTIVE USER SIGN-INS

Non-interactive sign-ins are done on behalf of a user. These delegated sign-ins
were performed by a client app or OS components on behalf of a user and don't
require the user to provide an authentication factor. Instead, Microsoft Entra
ID recognizes when the user's token needs to be refreshed and does so behind the
scenes, without interrupting the user's session. In general, the user perceives
these sign-ins as happening in the background.



Report size: Large
Examples:

 * A client app uses an OAuth 2.0 refresh token to get an access token.
 * A client uses an OAuth 2.0 authorization code to get an access token and
   refresh token.
 * A user performs single sign-on (SSO) to a web or Windows app on a Microsoft
   Entra joined PC (without providing an authentication factor or interacting
   with a Microsoft Entra prompt).
 * A user signs in to a second Microsoft Office app while they have a session on
   a mobile device using FOCI (Family of Client IDs).

In addition to the default fields, the non-interactive sign-in log also shows:

 * Resource ID
 * Number of grouped sign-ins

You can't customize the fields shown in this report.

To make it easier to digest the data, non-interactive sign-in events are
grouped. Clients often create many non-interactive sign-ins on behalf of the
same user in a short time period. The non-interactive sign-ins share the same
characteristics except for the time the sign-in was attempted. For example, a
client might get an access token once per hour on behalf of a user. If the state
of the user or client doesn't change, the IP address, resource, and all other
information is the same for each access token request. The only state that does
change is the date and time of the sign-in.



When Microsoft Entra logs multiple sign-ins that are identical other than time
and date, those sign-ins are from the same entity and are aggregated into a
single row. A row with multiple identical sign-ins (except for date and time
issued) has a value greater than one in the # sign-ins column. These aggregated
sign-ins might also appear to have the same time stamps. The Time aggregate
filter can set to 1 hour, 6 hours, or 24 hours. You can expand the row to see
all the different sign-ins and their different time stamps.

Sign-ins are aggregated in the non-interactive users when the following data
matches:

 * Application
 * User
 * IP address
 * Status
 * Resource ID

Note

The IP address of non-interactive sign-ins performed by confidential clients
doesn't match the actual source IP of where the refresh token request is coming
from. Instead, it shows the original IP used for the original token issuance.


SERVICE PRINCIPAL SIGN-INS

Unlike interactive and non-interactive user sign-ins, service principal sign-ins
don't involve a user. Instead, they're sign-ins by any nonuser account, such as
apps or service principals (except managed identity sign-in, which are in
included only in the managed identity sign-in log). In these sign-ins, the app
or service provides its own credential, such as a certificate or app secret to
authenticate or access resources.



Report size: Large
Examples:

 * A service principal uses a certificate to authenticate and access the
   Microsoft Graph.
 * An application uses a client secret to authenticate in the OAuth Client
   Credentials flow.

You can't customize the fields shown in this report.

To make it easier to digest the data in the service principal sign-in logs,
service principal sign-in events are grouped. Sign-ins from the same entity
under the same conditions are aggregated into a single row. You can expand the
row to see all the different sign-ins and their different time stamps. Sign-ins
are aggregated in the service principal report when the following data matches:

 * Service principal name or ID
 * Status
 * IP address
 * Resource name or ID


MANAGED IDENTITY SIGN-INS

Managed identities for Azure resources sign-ins are sign-ins that were performed
by resources that have their secrets managed by Azure to simplify credential
management. A VM with managed credentials uses Microsoft Entra ID to get an
Access Token.



Report size: Small
Examples:

You can't customize the fields shown in this report.

To make it easier to digest the data, managed identities for Azure resources
sign-in logs, non-interactive sign-in events are grouped. Sign-ins from the same
entity are aggregated into a single row. You can expand the row to see all the
different sign-ins and their different time stamps. Sign-ins are aggregated in
the managed identities report when all of the following data matches:

 * Managed identity name or ID
 * Status
 * Resource name or ID

Select an item in the list view to display all sign-ins that are grouped under a
node. Select a grouped item to see all details of the sign-in.


SIGN-IN DATA USED BY OTHER SERVICES

Sign-in data is used by several services in Azure to monitor risky sign-ins,
provide insight into application usage, and more.




MICROSOFT ENTRA ID PROTECTION

Sign-in log data visualization that relates to risky sign-ins is available in
the Microsoft Entra ID Protection overview, which uses the following data:

 * Risky users
 * Risky user sign-ins
 * Risky workload identities

For more information about the Microsoft Entra ID Protection tools, see the
Microsoft Entra ID Protection overview.




MICROSOFT ENTRA USAGE AND INSIGHTS

To view application-specific sign-in data, browse to Microsoft Entra ID >
Monitoring & health > Usage & insights. These reports provide a closer look at
sign-ins for Microsoft Entra application activity and AD FS application
activity. For more information, see Microsoft Entra Usage & insights.



There are several reports available in Usage & insights. Some of these reports
are in preview.

 * Microsoft Entra application activity (preview)
 * AD FS application activity
 * Authentication methods activity
 * Service principal sign-in activity
 * Application credential activity


MICROSOFT 365 ACTIVITY LOGS

You can view Microsoft 365 activity logs from the Microsoft 365 admin center.
Microsoft 365 activity and Microsoft Entra activity logs share a significant
number of directory resources. Only the Microsoft 365 admin center provides a
full view of the Microsoft 365 activity logs.

You can access the Microsoft 365 activity logs programmatically by using the
Office 365 Management APIs.





--------------------------------------------------------------------------------


FEEDBACK

Was this page helpful?

Yes No
Provide product feedback


FEEDBACK

Coming soon: Throughout 2024 we will be phasing out GitHub Issues as the
feedback mechanism for content and replacing it with a new feedback system. For
more information see: https://aka.ms/ContentUserFeedback.

Submit and view feedback for

This product This page
View all page feedback

--------------------------------------------------------------------------------


ADDITIONAL RESOURCES



--------------------------------------------------------------------------------

Training

Module

Monitor and maintain Microsoft Entra ID - Training

Audit and diagnostic logs within Microsoft Entra ID provide a rich view into how
users are accessing your Azure solution. Learn to monitor, troubleshoot, and
analyze sign-in data.

Certification

Microsoft Certified: Identity and Access Administrator Associate -
Certifications

Demonstrate the features of Microsoft Entra ID to modernize identity solutions,
implement hybrid solutions, and implement identity governance.



English (United States)
California Consumer Privacy Act (CCPA) Opt-Out Icon Your Privacy Choices
Theme
 * Light
 * Dark
 * High contrast

 * Manage cookies
 * Previous Versions
 * Blog
 * Contribute
 * Privacy
 * Terms of Use
 * Trademarks
 * © Microsoft 2024


ADDITIONAL RESOURCES



--------------------------------------------------------------------------------

Training

Module

Monitor and maintain Microsoft Entra ID - Training

Audit and diagnostic logs within Microsoft Entra ID provide a rich view into how
users are accessing your Azure solution. Learn to monitor, troubleshoot, and
analyze sign-in data.

Certification

Microsoft Certified: Identity and Access Administrator Associate -
Certifications

Demonstrate the features of Microsoft Entra ID to modernize identity solutions,
implement hybrid solutions, and implement identity governance.




IN THIS ARTICLE



English (United States)
California Consumer Privacy Act (CCPA) Opt-Out Icon Your Privacy Choices
Theme
 * Light
 * Dark
 * High contrast

 * Manage cookies
 * Previous Versions
 * Blog
 * Contribute
 * Privacy
 * Terms of Use
 * Trademarks
 * © Microsoft 2024