How to track users’ sign-ins with location details?
+
Analyzing sign-ins with location details helps to identify user logins from unfamiliar locations, enhancing security by detecting potential unauthorized access and enabling prompt response to suspicious activities.
To get a list of user sign-ins with location details, run the below PowerShell cmdlet.
Get-MgAuditLogSignIn | Select-Object -Property CreatedDateTime, UserPrincipalName, UserDisplayName -ExpandProperty Location | Format-List
To get a list of users’ sign-ins with authentication details in Microsoft 365, run the below PowerShell cmdlet.
Get-MgAuditLogSignIn | Select-Object -Property CreatedDateTime, UserPrincipalName, UserDisplayName -ExpandProperty Status | Format-List
To get a list of user sign-ins with device details such as operating system, browser, device display name, run the below PowerShell cmdlet.
Get-MgAuditLogSignIn | Select-Object -Property CreatedDateTime, UserPrincipalName, UserDisplayName -ExpandProperty DeviceDetail | Format-List
AdminDroid offers a user-friendly approach to efficiently audit sign-ins with authentication methods!
- Here, you get a detailed report on successful MFA sign-ins, sign-ins that failed in the MFA challenge, and sign-ins with various authentication methods.
- Also, AdminDroid offers a user sign-in summary with CA policy at a user level and organizational level.
Pro Tip: Create alerts on MFA sign-in failures with a desired threshold to proactively monitor the risky sign-in attempts.