Implementing Multi-Factor Authentication
Configuring Application Access
Implementing Access for External users
The course is part of this learning path
This course has been designed to teach you how to manage Microsoft 365 access and authentication. The content in this course will help prepare you for the Microsoft 365 Identity and Services exam.
The topics covered within this course include:
- Managing Authentication
- Implementing Multi-Factor Authentication
- Configuring Application Access
- Implementing Access for External Users of Microsoft 365 Workloads
Who should attend this course?
- Those who are preparing for the Microsoft 365 Identity and Services exam
- Those looking to learn more about Microsoft 365
- To learn how to configure and monitor authentication
- To learn how to administer MFA and report on its utilization
- To learn how to configure application registration and use Azure AD Application Proxy
- To learn how to use Azure Active Directory B2B to add and manage external users
To get the most from this course, you should at least be familiar with the Microsoft 365 offering and have a general understanding of its features.
- [Instructor] Reporting in Azure Active Directory consists of two main components, their activity and security. Activity governs sign-ins and audit logs while security governs risky sign-ins and users that are flagged as a risk. Sign-ins, which are reported under activity, provide information about managed application usage as well as user sign-in activities. Audit logs, also found under activity, provide information about user and group management activities. Also included is information on managed applications and directory activities. Risk sign-ins, which fall under security, indicate attempts that may have been performed by someone who is not the legitimate owner of an account. Users flagged for risk, however, refer to user accounts that may have been compromised. To access the data in the sign-in activity reports, a user must be assigned the security administrator, security reader or report reader role. Global administrators can also access the data in the sign-in activity reports. Additionally, any user can access his or her own sign-ins. In order to access sign-in activity, a tenant must have an Azure AD Premium license associated with it. Without an Azure AD Premium license, you cannot see the sign-in activity reports. Administrators can use the user sign-ins report to view the sign-in pattern of a user, how many users have signed in over the course of the week, and the status of the sign-ins. To access the sign-ins report, click sign-ins in the activity section of the Azure Active Directory blade. From here, you can view interactive sign-ins which refer to instances where a user has manually signed in using his or her username and password. The sign-ins report does not, however, display non-interactive sign-ins such as service-to-service authentications. The default view of the sign-ins log shows the recorded sign-in date, the related user, the application the user is signed into, the status of the sign-in, the status of the risk detection for the sign-in, and the status of the multi-factor authentication requirement for the sign-in in question. The view can be customized by clicking columns in the toolbar. In addition to viewing the default report, you can narrow down the reported data by filtering the sign-ins data by user, application, sign-in status, conditional access and date. In the next lesson, we'll walk through a demo of how to use the sign-in activity reports to view activity.
About the Author
Tom is a 25+ year veteran of the IT industry, having worked in environments as large as 40k seats and as small as 50 seats. Throughout the course of a long an interesting career, he has built an in-depth skillset that spans numerous IT disciplines. Tom has designed and architected small, large, and global IT solutions.
In addition to the Cloud Platform and Infrastructure MCSE certification, Tom also carries several other Microsoft certifications. His ability to see things from a strategic perspective allows Tom to architect solutions that closely align with business needs.
In his spare time, Tom enjoys camping, fishing, and playing poker.