Implementing Multi-Factor Authentication
Configuring Application Access
Implementing Access for External users
The course is part of this learning path
This course has been designed to teach you how to manage Microsoft 365 access and authentication. The content in this course will help prepare you for the Microsoft 365 Identity and Services exam.
The topics covered within this course include:
- Managing Authentication
- Implementing Multi-Factor Authentication
- Configuring Application Access
- Implementing Access for External Users of Microsoft 365 Workloads
Who should attend this course?
- Those who are preparing for the Microsoft 365 Identity and Services exam
- Those looking to learn more about Microsoft 365
- To learn how to configure and monitor authentication
- To learn how to administer MFA and report on its utilization
- To learn how to configure application registration and use Azure AD Application Proxy
- To learn how to use Azure Active Directory B2B to add and manage external users
To get the most from this course, you should at least be familiar with the Microsoft 365 offering and have a general understanding of its features.
- [Instructor] In this demonstration, we're going to access the sign-ins report in Azure Active Directory. To access this report, we need to click on Sign-ins in the Monitoring Section of the Azure Active Directory blade. What we're looking for here are interactive sign-ins because remember the sign-ins report only displays interactive sign-ins where users have manually signed in using their username and password. Looking at the sign-ins report, we can see the default list view that shows the sign-in date, the related user, the application the user signed into, the sign-in status, the status of conditional access, and the status of the MFA requirements for each log-in. If we click Columns up here at the top, we can customize the view. Let's go ahead and open up this log-in for Joey Knish, and see what info is displayed. In the Basic Info tab, we can see the details of the sign-in. We can see the request and correlation IDs along with the information we're more likely to care about. We see the user info, the IP address where the sign-in originated, the location of the sign-in, along with the date of the sign-in, and which client app was used to sign in with. We can even see what specific app was used. For this log-in, Azure was listed because Joey Knish signed in to the Azure Portal. Clicking on Device Info let's us drill further down into the specific device the user signed in from. In this case, Joey Knish signed in from a Windows 10 machine using the Chrome browser, and the report even lists the Chrome version that was used. Clicking over to the MFA tab shows that the log-in required MFA or not. This particular log-in did not. The same goes for conditional access. Up at the top here, we can view our info with Power BI. We could also download the report if we wanted to. If you need to see what's up with Azure sign-ins, this is the report to run.
About the Author
Tom is a 25+ year veteran of the IT industry, having worked in environments as large as 40k seats and as small as 50 seats. Throughout the course of a long an interesting career, he has built an in-depth skillset that spans numerous IT disciplines. Tom has designed and architected small, large, and global IT solutions.
In addition to the Cloud Platform and Infrastructure MCSE certification, Tom also carries several other Microsoft certifications. His ability to see things from a strategic perspective allows Tom to architect solutions that closely align with business needs.
In his spare time, Tom enjoys camping, fishing, and playing poker.