This guide will show an administrator how to view password reset activities that users have initiated on their stored Microsoft account credentials.
Role Requirements
Procedure Scope: Administrators
Required Group Membership: Admin.Compliance
Handbook Reference
Package: TBD
Domain: TBD
Modifies: TBD
- Navigate to the Password Reset Audit Logs – Azure Active Directory portal, here you will find any self-service password reset (SSPR) activities that have been initiated by internal users. From this page you can see the date and time of the occurrence, the activity type that was initiated (blocked from SSPR, change password, reset password, etc.), and the status of the activity (success or failure). Filtering can be adjusted if you know specific information related to the event you are trying to explore.
Need Assistance?
Reach out to your Customer Success Manager to discuss how a Sittadel cybersecurity analyst can assist in managing these tasks for you. New to our services? Inquire about arranging a consultation to explore optimizing your Azure environment for painless management.